Infosecurity White Papers

C-Suite IT Execs Call for Federal Privacy Rules

Companies in the US are meeting new security and privacy regulations head on and they’re ready for more. When it arrives, though, they’d like more clarity.

Brought to you by
Infosecurity North America

The Gamer Theory of Threat Hunting

Gamify your threat hunting experience! Many organizations are shifting to iterative threat hunting exercises based around intelligence operations. This paper outlines gamified threat hunting levels, and key concepts ‘hunt gamers’ should focus on.

Brought to you by
Anomali

Deteque Threat Report 2018

Deteque is a division of Spamhaus and integrated with a global network of service providers and a community of researchers who have been dedicated to combating DNS abuse since 2008. Each year the research team at Spamhaus’ Malware Labs publishes its findings and this Report builds on the threat landscape of 2017 with latest figures from 2018 to date.

Brought to you by
Spamhaus Technology

Building Your Bullet Proof Incident Response Plan

This whitepaper looks at the current state of corporate cyber security when even the largest organizations are often overwhelmed by the volume of flagged incidents and unknown files that need to be investigated. Meanwhile, businesses’ and customers’ sensitive information is at risk of being compromised by the needle in the haystack: the major threat hiding in plain sight among false positives.

Brought to you by
Intezer

Stopping Data Exfiltration and Malware Spread Through DNS

Recent research from IDC predicts worldwide spending on security-related hardware, software, and services will reach $119.9 billion in 2021.

Brought to you by
Infoblox

A Fresh Look at Security Analytics

Most enterprises are at least discussing security analytics. But how are they actually deploying these tools? And with what levels of automation and orchestration?

Brought to you by
ThreatConnect

Investing in Cyber Insurance: the What, the Why and the How

Just as the expectations that a business will experience a cyber incident are increasing, so too are the costs of recovering from those breaches. As of 2018, the global average cost of a data breach is $3.6 million, or about $141 per stolen data record.

Brought to you by
Wallix

A Practical Guide To Outsourcing Your Service Desk

For businesses new to outsourcing their services, outsourcing the service desk functionality can be an easy first step.

Brought to you by
Comarch

Building Your Response Plan: Critical Steps and Best Practices

These days, businesses of all sizes need to be concerned about cyber attacks. The attack size and frequency have continued to rise. What’s more, the DDoS underground has made it easier for anyone – even without technical skills – to launch a damaging DDoS attack.

Brought to you by
Activereach Ltd

SANS 2018 Threat Hunting Survey Results

Threat hunting is an approach that drives security benefits across the organization. This paper looks at the state of threat hunting and provides approaches organizations can take to amplify their threat hunting programs.

Brought to you by
Anomali

How to Include a Preventative Measure into your Detection & Response

You’ve fortified your defences. You follow industry best prac¬tices. You’ve purchased the latest and greatest technology. Yet attackers still penetrate your defences. In a world where it’s expected that attackers will successfully breach your perimeter, what chance can you possibly have to protect your business?

Brought to you by
Mnemonic

5 Critical Steps to Successful Risk Assessments

It’s imperative that organisations conduct risk assessments when preparing, maintaining and updating their cyber security policies and programs. Thorough risk assessments help you identify and address any threats that your organisation may face, allowing you to mitigate them before it’s too late. Organisations that are not ready or not looking to implement ISO 27001 should also read this paper to understand what data protection and cyber security risks they might be taking.

Brought to you by
Vigilant Software

What’s Hot on Infosecurity Magazine?