Infosecurity White Papers

Your Employees Won't Protect You

Businesses need innovation to protect their staff from activating a cyber-attacks.

Brought to you by
Glasswall Solutions

Social Media a Growing Risk for Corporate Security

Social Media a Growing Risk for Corporate Security

Social media is increasingly used by cybercriminals as an attack vector to run scams and carry out malicious attacks.

Brought to you by
Cyberint

EMEA: Using Security Metrics to Drive Action

22 experts share how to communicate security program effectiveness to business executives on the board

Brought to you by
Tenable

10 Ways to Secure Your Digital Content

10 Ways to Secure Your Digital Content

Today, digital security is top-of-mind. In this whitepaper, Limelight discusses ten different ways to protect your digital content, ensure high availability, and maintain superior quality of experience for every digital visitor.

Brought to you by
Limelight Networks

Applying Data Science to User and Entity Behavior Analytics

This paper discusses the application of data science within a User and Entity Behavior Analytics (UEBA) product to address cyber threats.

Brought to you by
Exabeam

Accelerate Incident Response with Threat Intelligence

Accelerate Incident Response with Threat Intelligence

How Threat Intelligence improves Incident Response: escalate faster, react faster.

Brought to you by
eclectic iq

Security Challenges in Migrating to 100Gb Network

As data traffic continues to evolve and increase, Network Engineers and Network Architects need to migrate their data to an upgraded network that can support 40Gb or 100Gb speeds.

Brought to you by
Niagara Networks

Next-Gen Approaches to Attack Remediation

Next-Gen Approaches to Attack Remediation

Enterprise Management Associates (EMA) analysts take on packet-based security forensics and strategies to ID and remediate attacks.

Brought to you by
Viavi Solutions

Practical Steps to Address EU General Data Protection Regulation Compliance (GDPR)

Practical Steps to Address EU General Data Protection Regulation Compliance

Brought to you by
TRUSTe

EU Data Protection Reform

EU Data Protection Reform

Background and insight into GDPR. What it means for business.

Brought to you by
BSI Group

How Threat Intelligence Quantifies Risk for the Business

It can be argued that cyber threat intelligence (CTI) is most valuable to a business when it continuously informs a quantitative risk assessment model that contains specific probabilities for loss from a specific threat type.

Brought to you by
Recorded Future

Pentesting - The Required Human Ingenuity to Uncover Security Gaps

Pentesting - The Required Human Ingenuity to Uncover Security Gaps

How is a pentest different from a vulnerability assessment?

Brought to you by
Spirent

What’s Hot on Infosecurity Magazine?