Infosecurity White Papers

Red Teaming: How to Identify Gaps in Your Security Strategy by Thinking Like the Enemy

This guide explains what red teaming is, how to get the most from it and the business benefits it brings.

Brought to you by
Context Information Security

Best Practices for GDPR & CCPA Compliance

AccessData has worked with Osterman Research to conduct an in-depth survey of North American organizations with regard to their plans for GDPR and CCPA compliance. This whitepaper provides an overview of the survey findings.

Brought to you by
AccessData

Ponemon Report: Trends in the Cost of Web Application & Denial of Service Attacks

The purpose of this research is to understand changes in the cost and consequences of web application and denial of service attacks.

Brought to you by
Activereach Ltd

PAM - A Key Element in ISO 27001 Compliance

This white paper looks at sections of the standard that apply directly and indirectly to PAM, using the example of the WALLIX Bastion to highlight how a PAM solution can help companies achieve the ISO 27001 certification.

Brought to you by
Wallix

Anatomy of a Cyber-Attack

How does an organization “protect” themselves from a breach? In this whitepaper, learn how to determine network health before proceeding with advisory engagements.

Brought to you by
Infocyte

Navigating a Security Wasteland

In this whitepaper, Cybrary discusses how “managing your enterprise security organization like a small business” is pivotal when it comes to application & cloud security.

Brought to you by
ThreatConnect

Security Threats: Is That a Trojan in Your Pocket?

The popularity, portability and precarious security mobile devices an attractive target for cybercriminals. It is time to get serious about mobile security. Start with a corporate mobility policy to define your mobile security strategy, and deploy an EMM solution to make it happen.

Brought to you by
SOTI

C-Suite IT Execs Call for Federal Privacy Rules

Companies in the US are meeting new security and privacy regulations head on and they’re ready for more. When it arrives, though, they’d like more clarity.

Brought to you by
Infosecurity North America

The Gamer Theory of Threat Hunting

Gamify your threat hunting experience! Many organizations are shifting to iterative threat hunting exercises based around intelligence operations. This paper outlines gamified threat hunting levels, and key concepts ‘hunt gamers’ should focus on.

Brought to you by
Anomali

Deteque Threat Report 2018

Deteque is a division of Spamhaus and integrated with a global network of service providers and a community of researchers who have been dedicated to combating DNS abuse since 2008. Each year the research team at Spamhaus’ Malware Labs publishes its findings and this Report builds on the threat landscape of 2017 with latest figures from 2018 to date.

Brought to you by
Spamhaus Technology

Building Your Bullet Proof Incident Response Plan

This whitepaper looks at the current state of corporate cyber security when even the largest organizations are often overwhelmed by the volume of flagged incidents and unknown files that need to be investigated. Meanwhile, businesses’ and customers’ sensitive information is at risk of being compromised by the needle in the haystack: the major threat hiding in plain sight among false positives.

Brought to you by
Intezer

Stopping Data Exfiltration and Malware Spread Through DNS

Recent research from IDC predicts worldwide spending on security-related hardware, software, and services will reach $119.9 billion in 2021.

Brought to you by
Infoblox

What’s Hot on Infosecurity Magazine?