Infosecurity White Papers

Leveled-Up Value Recognition for Shared Security Services

What Challenges Do Managed Security Service Providers Face?

Brought to you by
FourV

Evolving Threats Call For Integrated Endpoint Security Solutions With Holistic Visibility

Evolving Threats Call For Integrated Endpoint Security Solutions With Holistic Visibility

High-profile, targeted attacks from malicious actors now occur with frightening and increasing regularity.

Brought to you by
Trend Micro

Is Data Security in Financial Services Simply a Box-Ticking Exercise?

A four step guide to protecting your organization’s reputation and your customers’ data

Brought to you by
Egress Software Technologies Ltd

How to Build a Skilled IT Security Team in 5 Steps

How to Build a Skilled IT Security Team in 5 Steps

In an era of APT and sophisticated attacks, how do you make sure that your IT Security team and your organization have the right skills to protect your most critical assets? This paper focuses on the steps every organization should take to minimize cyber security risk for the coming years.

Brought to you by
eLearnSecurity

Preparing your Organization for the Inevitable HIPAA Audit

A four step guide to protecting your organization’s reputation and your customers’ data

Brought to you by
Egress Software Technologies Ltd

Educational Institutions at High Risk for Costly Data Breaches

Educational Institutions at High Risk for Costly Data Breaches

The Ponemon Institute estimates that on average, organizations of all types face a 26% probability of a data breach involving 10,000 or more lost or stolen records – and educational institutions are increasingly becoming targets.

Brought to you by
Apricorn

2017 Study on Mobile and IoT Application Security

Ponemon Institute is pleased to present the findings of the 2017 Study on Mobile and Internet of Things Application Security sponsored by IBM and Arxan Technologies.

Brought to you by
Arxan

The Right Prescription for Maintaining Compliance with Patient Security Regulations

The Right Prescription for Maintaining Compliance with Patient Security Regulations

In the healthcare industry, expensive equipment is usually a point of pride, but one leading provider never intended to pay $1.5 million each for two laptops.

Brought to you by
Apricorn

Insider Threats to Financial Services

Uncover evidence with external intelligence

Brought to you by
Recorded Future

Using Indicators To Deal With Security Attacks

Using Indicators To Deal With Security Attacks

Understand the unique capabilities of indicators of compromise and attack, the differences between them, and the steps to configure a SIEM solution to detect IoCs and IoAs.

Brought to you by
ManageEngine

Ransomware: What's the Cost to Business?

The steps organisations should take to mitigate the risk of ransomware attack

Brought to you by
NTT Security

Best Practices for Securing Privileged Access

Best Practices for Securing Privileged Access

Read this whitepaper to learn best practices for processes, policies and technology used to secure access to privileged accounts and other elevated privileges.

Brought to you by
Hitachi ID Systems

What’s Hot on Infosecurity Magazine?