Infosecurity White Papers

A Fresh Look at Security Analytics

Most enterprises are at least discussing security analytics. But how are they actually deploying these tools? And with what levels of automation and orchestration?

Brought to you by

Investing in Cyber Insurance: the What, the Why and the How

Just as the expectations that a business will experience a cyber incident are increasing, so too are the costs of recovering from those breaches. As of 2018, the global average cost of a data breach is $3.6 million, or about $141 per stolen data record.

Brought to you by

A Practical Guide To Outsourcing Your Service Desk

For businesses new to outsourcing their services, outsourcing the service desk functionality can be an easy first step.

Brought to you by

Building Your Response Plan: Critical Steps and Best Practices

These days, businesses of all sizes need to be concerned about cyber attacks. The attack size and frequency have continued to rise. What’s more, the DDoS underground has made it easier for anyone – even without technical skills – to launch a damaging DDoS attack.

Brought to you by
Activereach Ltd

SANS 2018 Threat Hunting Survey Results

Threat hunting is an approach that drives security benefits across the organization. This paper looks at the state of threat hunting and provides approaches organizations can take to amplify their threat hunting programs.

Brought to you by

How to Include a Preventative Measure into your Detection & Response

You’ve fortified your defences. You follow industry best prac¬tices. You’ve purchased the latest and greatest technology. Yet attackers still penetrate your defences. In a world where it’s expected that attackers will successfully breach your perimeter, what chance can you possibly have to protect your business?

Brought to you by

5 Critical Steps to Successful Risk Assessments

It’s imperative that organisations conduct risk assessments when preparing, maintaining and updating their cyber security policies and programs. Thorough risk assessments help you identify and address any threats that your organisation may face, allowing you to mitigate them before it’s too late. Organisations that are not ready or not looking to implement ISO 27001 should also read this paper to understand what data protection and cyber security risks they might be taking.

Brought to you by
Vigilant Software

NTT Security 2018 Global Threat Intelligence Report Executive Guide

The relentless evolution of the threat landscape places the onus on businesses to innovate more rapidly than their adversaries. Cyber-awareness from the top down is imperative if the business, clients, and employees are to be protected.

Brought to you by
Dimension Data

Web Application: A Guide to Security in the Modern Era

Virtually all enterprise applications and assets have become web-facing whether in the form of a traditional web-application, cloud applications, APIs, microservices, or legacy apps accessed through a web interface. These applications are being continuously developed and delivered at unprecedented speed, and are constantly being probed and attacked by human and automated threats.

Brought to you by
Threat X

Privileged Access Management in the Cloud

Cloud migration of all critical resources, or even a portion for hybrid environments, presents serious security challenges and risks to the organization.

Brought to you by

Why Bots are Security's Blind Spot, and How to Manage Them

For organizations and their focus on identity, this new wave of bots presents both a security challenge and a powerful opportunity.

Brought to you by

How to conquer phishing? Beat the clock.

This whitepaper explains how the combination of automated, technology-driven pre-incident protection and post-incident protection and incident response is by far the fastest and most effective approach, quantifiably reducing the organisation's risk from phishing attacks by more than 70%, with ongoing upside.

Brought to you by

What’s Hot on Infosecurity Magazine?