Infosecurity White Papers

What Leads to Security Gaps in Financial Services

This Research Brief focuses on unstructured data(such as Microsoft Office files, PDFs, and image files), and the security risks present in many of the internal business processes that use it.

Brought to you by
BlackBerry

Ponemon Report: The Value of Threat Intelligence

Ponemon Report: The Value of Threat Intelligence

The Ponemon Institute surveyed 1,000+ US and UK security professionals on a range of threat intelligence topics. Results show that organizations are rapidly incorporating threat intelligence into their security programs. Learn key findings and more.

Brought to you by
Anomali

Forrester Findings: Modern Authentication Methods that Protect and Enable

Forrester Findings: Modern Authentication Methods that Protect and Enable

Forrester recently surveyed 100 IT and security executives to understand their current approaches to user authentication and access management. Check out their report to learn what authentication methods other companies are using and which of these methods are most effective.

Brought to you by
Entrust Datacard

Pen Test Metrics 2018

What is your current confidence level in your application security program?

Brought to you by
Cobalt

The Evolving and Challenging Landscape of Identity Management

In 2017, identity fraud hit an all-time high of 175,000 incidents according to the Cifas’ National Fraud Database and the number continues to rise.

Brought to you by
BSI Group

Is DNS your Security Achilles Heel?

Explore how attackers take advantage of recursive DNS and learn best practices you can follow to mitigate the risks.

Brought to you by
Activereach Ltd, Akamai

CVE Publishing: A Race to Protect against Dark Web Threat Actors Trying to Exploit

Although the practice of alerting the public with new CVEs (Critical Vulnerabilities and Exposures) is a crucial component in contemporary cyber-security strategy, Dark Web threat actors are actively searching for new vulnerabilities and investing considerable effort in finding ways to exploit them before organizations can protect themselves.

Brought to you by
Sixgill

The Complete Guide on Open Source Security

The Complete Guide on Open Source Security

The ins and outs of open source security in one comprehensive guide.

Brought to you by
WhiteSource

The Untapped Potential of Malware Classification

Choosing function and convenience over online privacy and security may come at a price.

Brought to you by
Intezer

Corporate Data: the More You Have, the Greater the Risk

Corporate Data: the More You Have, the Greater the Risk

What You Need to Know to Protect Corporate Data Throughout its Lifecycle

Brought to you by
Blancco

CISO's Guide to Compliance

Quickly Meet Regulatory Compliance and Improve Security with PAM.

Brought to you by
Wallix

A Modern Identity for the Modern Consumer

A Modern Identity for the Modern Consumer

Learn how one trusted identity can transform the banking experience.

Brought to you by
Entrust Datacard

What’s Hot on Infosecurity Magazine?