Infosecurity White Papers

Email Fraud Threat Report

Proofpoint analyzed more than 160 billion emails sent to more than 2,400 companies spanning 150 countries. Here are their findings for 2017.

Brought to you by
Proofpoint

Virtualization's Hidden Gem: Application Security

Virtualization's Hidden Gem: Application Security

How network virtualization and micro-segmentation can secure your application infrastructure

Brought to you by
VMware

The Necessity of Software Protection

Cloakware reports are intended to provide factual, informative descriptions of important topics in cybersecurity, coupled with statistics and perspectives on currently important events and attacks.

Brought to you by
Cloakware by Irdeto

The Definitive Guide to Data Loss Prevention

The Definitive Guide to Data Loss Prevention

This comprehensive guide provides what you need to understand, evaluate, and succeed with today's DLP.

Brought to you by
Digital Guardian

Gartner Magic Quadrant Report for Enterprise Information Archiving

Originally designed for file and email retention, enterprise information archiving (EIA) now incorporates products and solutions for handling a far wider range of user messaging content.

Brought to you by
Proofpoint

Who Needs Malware?

Who Needs Malware?

How adversaries use fileless attacks to evade your security.

Brought to you by
CrowdStrike

Paradigm Shifts

Download this whitepaper looking into the current and emerging threats that will make inroads in the 2018 landscape.

Brought to you by
Trend Micro

Data Governance Implementation Survey 2018

Data Governance Implementation Survey 2018

Over 500 SQL Server professionals participated in the "Data Governance Implementation Survey 2018", with respondents coming from across the globe and representing a wide range of job roles, company sizes, and industries.

Brought to you by
Redgate

Self-healing Cybersecurity for the Digital Era

Staying ahead of the latest security threats can be a challenge for any organization.

Brought to you by
Seceon

A Collaborative Approach to Compliance

A Collaborative Approach to Compliance

An in-depth perspective on information security compliance and broader IT GRC programmes, revealing their inherent complexity, their collaborative nature and introducing the principles of ‘collaborative compliance’, which can be leveraged to gain operational efficiencies and costs savings.

Brought to you by
SureCloud

Providing Banks and Financial Institutions with Legally Compliant Digital Signatures

Learn more about legally binding digital signatures based on qualified digital certificates and the benefits they provide to banks and financial institutions

Brought to you by
vintegrisTECH

Cyber Intrusion Services Casebook

Cyber Intrusion Services Casebook

Drawn from real-life engagements, this annual casebook provides valuable insights into the evolving tactics, techniques, and procedures used by today’s most sophisticated adversaries.

Brought to you by
CrowdStrike

What’s Hot on Infosecurity Magazine?