Infosecurity White Papers

Ransomware - A New Approach to Identifying, Blocking and Real-Time Remediation

Ransomware attacks targeting companies have escalated 300% since January 2016; attacks are occurring every 40 seconds.

Brought to you by
CheckPoint, Dimension Data, NTT Security

Your Employees Won't Protect You

Your Employees Won't Protect You

Why businesses need an innovation injection to stay safe from cyber threats

Brought to you by
Glasswall Solutions

2017 Risk Value Report: Business Security- Always a Journey, Never a Destination

Download this new Risk:Value Report, commissioned by NTT Security, which highlights concerns and attitudes to security across global organisations; from compliance and cyber insurance to incident response planning.

Brought to you by
CheckPoint, Dimension Data, NTT Security

Encryption in Government: Make the Rules, Play by the Rules

Encryption in Government: Make the Rules, Play by the Rules

Few entities possess as much personal information as the U.S. government. In 2015, the Internal Revenue Service processed over 150 million tax returns, and the Social Security Administration paid benefits to nearly 60 million Americans.

Brought to you by
Apricorn

Avoiding Privilege Abuse in Active Directory

It’s inevitable. You’ve given a number of individuals in your organization rights to run around in AD making changes as they see fit, with little oversight. It’s a situation that’s ripe for abuse.

Brought to you by
Lepide Software

2017 Open Source Security & Risk Analysis Report

2017 Open Source Security & Risk Analysis Report

This analysis was done by Black Duck’s Center for Open Source Research and Innovation (COSRI) and examines findings from the anonymized data of more than 1,000 commercial applications audited in 2016.

Brought to you by
Blackduck

Prescriptive Guide to Security Reference Architecture

Learn how to develop an overall strategy for security and compliance, including selecting the best security framework for your environment.

Brought to you by
Tripwire

Security Configuration Management: Getting Back to IT Security Basics

Security Configuration Management: Getting Back to IT Security Basics

Cloud Computing. Virtualization. Social Networking. IT Consumerization. What do these trends all have in common?

Brought to you by
Tripwire

A Mobile Security Checklist: The Top Ten Threats to Your Enterprise Today

These are the top 10 enterprise mobility security threats today

Brought to you by
BlackBerry

Four Kinds of Password Management

Four Kinds of Password Management

Gartner clients asking about "password management" may have in mind one of four topics covered by Gartner research. Security and risk management leaders responsible for IAM can use this report to identify the research pertinent to their needs.

Brought to you by
LogMeIn

Ready or Not? GDPR Maturity Across Vertical Industries

Download this whitepaper to find out why GDPR is going to have such a big impact.

Brought to you by
BlackBerry

How Proactive Prevention Can Eliminate an Unknown Threat

How Proactive Prevention Can Eliminate an Unknown Threat

A recent study from the Ponemon Institute stated that over 90% of enterprises have vulnerability backlogs of up to 5,000. An over reliance on detection is not working.

Brought to you by
Check Point Software Technologies

What’s Hot on Infosecurity Magazine?