Infosecurity White Papers

Strategy for a Successful Micro-Segmentation Journey

Learn about the common obstacles to successful micro-segmentation and how to avoid them and effectively use micro-segmentation to help protect mission-critical applications and workloads.

Brought to you by
Guardicore

Cybersecurity Intelligence Report

Download this report now and see where you are on the security continuum!

Brought to you by
Oracle + Dyn

Legal Team's Role in Investigating & Responding to a Data Breach

This whitepaper outlines the critical role of in-house legal in helping organizations effectively collaborate to manage post-breach investigations and minimize the damage – from the initial identification and investigation, through reporting findings and learning from the incident.

Brought to you by
AccessData

Ten Must-Have Features of a Modern SIEM

This white paper presents ten must-have features of an innovative and effective SIEM capable of handling evolving threats.

Brought to you by
Exabeam

Five Reasons Why You Need a Cloud-Native Web Application Firewall

The best way to protect your business from harmful incoming web traffic is to block it with a powerful web application firewall (WAF).

Brought to you by
Oracle + Dyn

Red Teaming: How to Identify Gaps in Your Security Strategy by Thinking Like the Enemy

This guide explains what red teaming is, how to get the most from it and the business benefits it brings.

Brought to you by
Context Information Security

Best Practices for GDPR & CCPA Compliance

AccessData has worked with Osterman Research to conduct an in-depth survey of North American organizations with regard to their plans for GDPR and CCPA compliance. This whitepaper provides an overview of the survey findings.

Brought to you by
AccessData

Ponemon Report: Trends in the Cost of Web Application & Denial of Service Attacks

The purpose of this research is to understand changes in the cost and consequences of web application and denial of service attacks.

Brought to you by
Activereach Ltd

PAM - A Key Element in ISO 27001 Compliance

This white paper looks at sections of the standard that apply directly and indirectly to PAM, using the example of the WALLIX Bastion to highlight how a PAM solution can help companies achieve the ISO 27001 certification.

Brought to you by
Wallix

Anatomy of a Cyber-Attack

How does an organization “protect” themselves from a breach? In this whitepaper, learn how to determine network health before proceeding with advisory engagements.

Brought to you by
Infocyte

Navigating a Security Wasteland

In this whitepaper, Cybrary discusses how “managing your enterprise security organization like a small business” is pivotal when it comes to application & cloud security.

Brought to you by
ThreatConnect

Security Threats: Is That a Trojan in Your Pocket?

The popularity, portability and precarious security mobile devices an attractive target for cybercriminals. It is time to get serious about mobile security. Start with a corporate mobility policy to define your mobile security strategy, and deploy an EMM solution to make it happen.

Brought to you by
SOTI

What’s Hot on Infosecurity Magazine?