Infosecurity White Papers

Harness the Benefits of Unified Physical & Logical Control Access

Harness the Benefits of Unified Physical & Logical Control Access

As high-profile data breaches grab headlines across the globe, many organizations are shifting their attention to external cyber-threats. While these external threats are very real, confronting internal vulnerabilities is one of the most effective ways of preventing attacks in the first place. Converging physical and logical access is one way to reduce risk.

Brought to you by
HID Global

How to Master IAM: Seven Key Steps

This eBook addresses seven of the most common IAM fears and how you can overcome them.

Brought to you by
Helpsystems

Managing the Risk of Post-Breach or "Resident" Attacks: A Ponemon Institute Study

Managing the Risk of Post-Breach or "Resident" Attacks: A Ponemon Institute Study

Download the report to learn the primary obstacles to better threat detection and incident response.

Brought to you by
Illusive Networks

The Benefits of Managed Detection Services

This report provides an expert perspective on how UK businesses must consider risk and regulatory issues when shaping protection requirements

Brought to you by
eSentire

Agile Security Manifesto

Agile Security Manifesto

The Agile Manifesto was created in 2001 to provide an alternative to document-heavy software development practices.

Brought to you by
Synopsys

The Convergence of Physical Access Control and IT in the Enterprise

This whitepaper summarizes the details discovered in this research and provides actionable insights that will increase collaboration between IT and Physical Security.

Brought to you by
HID Global

Remedying the Email Security Gaps in Microsoft Office 365

Remedying the Email Security Gaps in Microsoft Office 365

Why should you consider additional security protection around Microsoft Office 365TM email use? Furthermore, what should you look for in a third-party solution?

Brought to you by
Mimecast

Mastering MFA: Combining Security with Usability, at a Lower Cost

Read this whitepaper to learn how MFA can strengthen your security posture while also lowering your costs and ensuring a better user experience.

Brought to you by
Ping Identity

Cloud Threat Report 2019

Cloud Threat Report 2019

This report summarizes 11 case studies of cloud-based attacks, including spear phishing, insider threat and zero-day malware.

Brought to you by
Darktrace

Beyond FTP: Securing & Managing File Transfers

This paper examines how FTP became the standard for business-to-business file transfers. It identifies the key pitfalls that face management using this open protocol.

Brought to you by
Helpsystems

Common Use Cases for Attack Surface Manager

Common Use Cases for Attack Surface Manager

This whitepaper provides an overview of common ways that Illusive’s customers are using Attack Surface Manager, including fortifying PAM/PIM solutions, detecting insider threats and malicious insider activity and providing powerful, automated Red Team functions.

Brought to you by
Illusive Networks

Data Breach Survey 2019

Data Breach Survey 2019

The results of the research can offer insights that could help to inform the allocation of security budgets and strategies so that investment can be directed to where it will achieve the greatest impact in preventing costly data breaches.

Brought to you by
Egress

What’s Hot on Infosecurity Magazine?