Infosecurity White Papers

Phishing in Education

Phishing in Education

In this white paper, you’ll learn why Educational institutions form an increasingly coveted target for hackers, and what lessons you can learn from them

Brought to you by
Phished

The 2021 Synack Trust Report: Measuring Security, Building Trust - 9 Industries Ranked on Attacker Resistance

The 2021 Synack Trust Report: Measuring Security, Building Trust - 9 Industries Ranked on Attacker Resistance

Discover the most common vulnerabilities for your industry and best practices for making the attackers’ jobs harder

Brought to you by
Synack

5 Ways That New Software Technology Can Help Law Enforcement Teams

5 Ways That New Software Technology Can Help Law Enforcement Teams

Learn how ground-breaking software technology enables investigators to collaborate in real time—24/7 and from any location in the world

Brought to you by
Exterro

Modern Governance: A Guide for Security Professionals

Modern Governance: A Guide for Security Professionals

This guide compiles four key focus areas for security professionals to enable secure collaboration in a highly dynamic era.

Brought to you by
Diligent

UK Security Insights Report 2021: Intelligence from the Global Cybersecurity Landscape

UK Security Insights Report 2021: Intelligence from the Global Cybersecurity Landscape

Discover the key trends in hacking and malicious attacks, as well as the financial and reputational impact breaches have had in what has been an unprecedented year.

Brought to you by
VMware

Cyber AI for the Inbox

Cyber AI for the Inbox

This white paper explores recent trends in the email threat landscape, and describes how AI is used to detect and respond to the full range of attacks targeting the inbox.

Brought to you by
Darktrace

The 5 Steps to Effective Data Protection

The 5 Steps to Effective Data Protection

This whitepaper will take you through the 5 steps to implementing effective data protection within your organisation.

Brought to you by
Helpsystems

Outsourcing PKI to the Cloud

Outsourcing PKI to the Cloud

Read this whitepaper to understand why you should replace on-premise PKI with PKI-as-a-service

Brought to you by
HID Global

What We Learned from Sending Millions of Phishing Emails

What We Learned from Sending Millions of Phishing Emails

It turns out you can learn a lot from allowing yourself to be phished, or from phishing people yourself...

Brought to you by
Phished

Mainframe and security: current trends and key capabilities

Mainframe and security: current trends and key capabilities

Read this whitepaper to understand why mainframes remain a priority and continue to have a positive impact on security

Brought to you by
BMC

Securing C-Suite Collaboration in an Era of Insider Risk

Securing C-Suite Collaboration in an Era of Insider Risk

Discover the key actions to take to mitigate the virtual world’s very real risks for executives.

Brought to you by
Diligent

Overcoming Customer Identity
Challenges Without Compromising
the User Experience

Overcoming Customer Identity Challenges Without Compromising the User Experience

This whitepaper defines the problems of passwords for customer identity and access management, and highlights what companies can do about it

Brought to you by
Okta

What’s Hot on Infosecurity Magazine?