Infosecurity White Papers

Forged Email Protection

An analysis of email forgery techniques and protection methods available in Trend Micro SaaS email security products

Brought to you by
Trend Micro

Enhancing your Penetration Testing Regime

Enhancing your Penetration Testing Regime

This whitepaper explores how utilizing red-team or objective-oriented penetration testing services can provide increased insight into the security posture of an organization, its susceptibility to varying degrees of attack and its ability to detect and respond to such an attack.

Brought to you by
BSI Group

20 Steps to GDPR Compliance - A Methodical, Systematic and Logical Approach

20 steps to GDPR compliance – A methodical, systematic and logical approach: The General Data Protection Regulation (GDPR) is set to replace the Data Protection Directive 95/46/EC in May 2018.

Brought to you by
BSI Group

The Definitive Email Security Strategy Guide

The Definitive Email Security Strategy Guide

Get the 5 steps to building your email security strategy across the entire attack chain – from prevention through real-time response.

Brought to you by
Proofpoint

Email Impersonation Is Rampant - One in Five Messages Cannot Be Trusted

Without email authentication, fraudsters can easily impersonate any domain simply by putting it into the From field of their messages.

Brought to you by
ValiMail

Patient-Centric Data Protection

Patient-Centric Data Protection

Real World Scenarios of Stopping PHI Theft with DLP

Brought to you by
Digital Guardian

Building a Threat Intelligence Program

Turn tactical use cases into a strategic TI capability.

Brought to you by
Anomali

Social Media Protection for Dummies

Social Media Protection for Dummies

Learn how to build an effective social media protection program.

Brought to you by
Zerofox

Navigating the Evolving Threat Landscape with a More Complete Approach to Network Security

How targeted attacks are changing the network security landscape.

Brought to you by
Trend Micro

Securing the Server Compute Evolution: Hybrid Cloud Has Transformed the Datacenter

Securing the Server Compute Evolution: Hybrid Cloud Has Transformed the Datacenter

This Technology Spotlight highlights how hybrid cloud architectures, underpinned by the growth of cloud computing and virtualization, has transformed the way organizations should view server security.

Brought to you by
Trend Micro

Strengthening the Security Foundation of Cryptography

An overview of cryptographic randomness requirements for the data center/cloud, the limitations of previous methods, and Whitewood’s solution.

Brought to you by
Whitewood Security

The Definitive Guide to Sharing Threat Intelligence

The Definitive Guide to Sharing Threat Intelligence

Download this whitepaper to learn the main points for consideration in regards to sharing threat intelligence.

Brought to you by
Anomali

What’s Hot on Infosecurity Magazine?