Infosecurity White Papers

Producing a World-Class Threat Intelligence Capability

Producing a World-Class Threat Intelligence Capability

This paper focuses on critical concepts and practical details, where necessary, to produce a world-class threat intelligence capability from scratch.

Brought to you by
Recorded Future

How You Can Use the Dark Web for Threat Intelligence

See how combining information from the dark web with technical and open sources can reveal valuable threat intelligence.

Brought to you by
Recorded Future

The True Cost of Ransomware

The True Cost of Ransomware

5 Companies, 5 Attacks, and the Reality of Recovery

Brought to you by
Barkly

Providing a Better Cyber Security Assessment

As an advisory services provider, if you want to differentiate yourself from your competitors, moving to an automated data collection process will take your cyber security assessment services from good to great.

Brought to you by
FourV

Before and After Next-gen: Cybersecurity Considerations that Transcend Paradigm Shifts

Before and After Next-gen: Cybersecurity Considerations that Transcend Paradigm Shifts

There is no question that it is an exciting time for information technology, but concurrent shifts warrant a strategic perspective with respect to cybersecurity.

Brought to you by
Trend Micro

Secure Email Messaging in Office 365: Four Key Considerations

Download this whitepaper to learn the four issues that are highly important when considering email security functionality in O365.

Brought to you by
Egress Software Technologies Ltd

Detection of Denial of Service Attacks in Modern Cloud Environments

Detection of Denial of Service Attacks in Modern Cloud Environments

Due to local data processing laws and security policies, companies are often unable to use public cloud resources.

Brought to you by
Comarch

Leveled-Up Value Recognition for Shared Security Services

What Challenges Do Managed Security Service Providers Face?

Brought to you by
FourV

Evolving Threats Call For Integrated Endpoint Security Solutions With Holistic Visibility

Evolving Threats Call For Integrated Endpoint Security Solutions With Holistic Visibility

High-profile, targeted attacks from malicious actors now occur with frightening and increasing regularity.

Brought to you by
Trend Micro

Is Data Security in Financial Services Simply a Box-Ticking Exercise?

A four step guide to protecting your organization’s reputation and your customers’ data

Brought to you by
Egress Software Technologies Ltd

How to Build a Skilled IT Security Team in 5 Steps

How to Build a Skilled IT Security Team in 5 Steps

In an era of APT and sophisticated attacks, how do you make sure that your IT Security team and your organization have the right skills to protect your most critical assets? This paper focuses on the steps every organization should take to minimize cyber security risk for the coming years.

Brought to you by
eLearnSecurity

Preparing your Organization for the Inevitable HIPAA Audit

A four step guide to protecting your organization’s reputation and your customers’ data

Brought to you by
Egress Software Technologies Ltd

What’s Hot on Infosecurity Magazine?