Infosecurity White Papers

The DIY Guide to Open Source Vulnerability Management

Application Vulnerabilities are the #1 Security Threat to Your Organization

Brought to you by
Blackduck

Read the Forrester Report: Vulnerability Management 2017

Read the Forrester Report: Vulnerability Management 2017

Why is vulnerability management so difficult?

Brought to you by
Tenable

7 Steps to Compliance with Data Protection Laws

How Data Protection Regulations Apply to External File Transfers

Brought to you by
Ipswitch

Security as a Business Enabler

Security as a Business Enabler

How to protect and enable your business through information security

Brought to you by
BlackBerry

Best Practices for Applying Threat Intelligence

46% of security professionals expect threat intelligence to be a very important part of their strategy in 2017.

Brought to you by
Recorded Future

Detecting Ransomware Using File Server Auditing

Detecting Ransomware Using File Server Auditing

Hackers use ransomware to encrypt files on a victim's computer, and then demand money in exchange for the decryption key. Such attacks are becoming increasingly more frequent and sophisticated.

Brought to you by
Lepide Software

The GDPR & Open Source Security Management

The EU GDPR mandates that all companies processing and/or holding the personal data of EU residents must protect that information—regardless of where it is sent, processed or stored.

Brought to you by
Blackduck

Securing Real-Time Communications for Dummies

Securing Real-Time Communications for Dummies

Recent high-profile cyberattacks have many organizations understandably focusing their security efforts on preventing data breaches.

Brought to you by
Sonus

Ransomware - A New Approach to Identifying, Blocking and Real-Time Remediation

Ransomware attacks targeting companies have escalated 300% since January 2016; attacks are occurring every 40 seconds.

Brought to you by
CheckPoint, Dimension Data, NTT Security

Your Employees Won't Protect You

Your Employees Won't Protect You

Why businesses need an innovation injection to stay safe from cyber threats

Brought to you by
Glasswall Solutions

2017 Risk Value Report: Business Security- Always a Journey, Never a Destination

Download this new Risk:Value Report, commissioned by NTT Security, which highlights concerns and attitudes to security across global organisations; from compliance and cyber insurance to incident response planning.

Brought to you by
CheckPoint, Dimension Data, NTT Security

Encryption in Government: Make the Rules, Play by the Rules

Encryption in Government: Make the Rules, Play by the Rules

Few entities possess as much personal information as the U.S. government. In 2015, the Internal Revenue Service processed over 150 million tax returns, and the Social Security Administration paid benefits to nearly 60 million Americans.

Brought to you by
Apricorn

What’s Hot on Infosecurity Magazine?