Infosecurity White Papers

SIEM for Beginners

Everything you wanted to know about log management but were afraid to ask

Brought to you by
Alien Vault

Open Source Network Security Tools for Beginners

Open Source Network Security Tools for Beginners

Let’s take a look at a few of the tools available, which will not only provide some answers, but also help you learn more about the topic.

Brought to you by
Alien Vault

Finding a Password Manager for Your Business

A guide to evaluating and comparing solutions.

Brought to you by
LogMeIn

How to Build a Security Operations Center

How to Build a Security Operations Center

Whether you’re protecting a bank or the local grocery store, certain common sense security rules apply. At the very least, you need locks on entrances and exits, cash registers and vaults as well as cameras pointed at these places and others throughout the facility.

Brought to you by
Alien Vault

Why GDPR Is Important and What You Need to Do to Get to Grips With It

Preparedness, technology tools, smart thinking and expert counsel will help you meet the tough challenges of incoming rules on data protection.

Brought to you by
BlackBerry

Detecting Compromised Credentials with UEBA

Detecting Compromised Credentials with UEBA

All of the biggest data breaches, judged either by number of records breached or the importance of the data stolen, have involved attackers leveraging stolen user credentials to gain access.

Brought to you by
Exabeam

Future Focus: Is Your Enterprise Ready for IoT?

A recent study by Juniper Research revealed that by 2020, the number of connected devices will have reached approximately 38.5 billion.

Brought to you by
BlackBerry

GDPR Handbook

GDPR Handbook

Everything you need to know about the EU General Data Protection Regulation (GDPR) and what do you need to do to comply.

Brought to you by
Manage Engine

Your Employees Won't Protect You

Businesses need innovation to protect their staff from activating a cyber-attacks.

Brought to you by
Glasswall Solutions

Social Media a Growing Risk for Corporate Security

Social Media a Growing Risk for Corporate Security

Social media is increasingly used by cybercriminals as an attack vector to run scams and carry out malicious attacks.

Brought to you by
Cyberint

EMEA: Using Security Metrics to Drive Action

22 experts share how to communicate security program effectiveness to business executives on the board

Brought to you by
Tenable

10 Ways to Secure Your Digital Content

10 Ways to Secure Your Digital Content

Today, digital security is top-of-mind. In this whitepaper, Limelight discusses ten different ways to protect your digital content, ensure high availability, and maintain superior quality of experience for every digital visitor.

Brought to you by
Limelight Networks

What’s Hot on Infosecurity Magazine?