Infosecurity White Papers

  1. The Weak Password Report 2022

    Password attacks are on the rise because passwords themselves are vulnerable to attack. What makes them vulnerable? This year’s Weak Password Report looks at both the human and the tech side of why passwords are the weakest link in an organization’s network.

  2. 2022 Cyber Risk Report: Contextualizing the MITRE ATT&CK Framework for Risk Reduction

    This new 2022 Cyber Risk report provides an operational and tactical roadmap you can use to make decisions about where to apply your cybersecurity capabilities.

  3. Employee Personal Information (PII) Exposure Online: An Underrecognized Business Risk

    Download this white paper to discover why the mountain of employee personal information available that’s already available on the open web is a potentially serious and costly problem for businesses.

  4. 2022 Annual State of Phishing Report

    Download the report to see how credential theft, business email compromise and ransomware threats continue to target businesses like yours and much more.

  5. State of Cybersecurity Report 2022

    Welcome to the fourth annual State of Cybersecurity Report brought to you by Infosecurity Europe and Infosecurity Magazine. This research presents and outlines the most influential security trends affecting the industry as a whole in 2022.

  6. The Key To Remediating Secrets in Code

    Download this whitepaper to find out more about how to locate and remediate secrets in code

  7. INSIDER RISK - Finding a Solution That Fits Your Needs

    Insider threats can be prevented by managing and understanding insider risk. Download this eBook to ensure your organization is prepared.

  8. The Three-Pillar Approach to Zero Trust Identity

    Read this guide to understand the core steps and strategies into three key stages to make scoping and implementing manageable.

  9. Predicts 2022: Consolidated Security Platforms Are the Future – A Gartner® Report

    Download the report to understand how SSE provides a better, simpler way to deliver safe access to the web, cloud, and private applications.

  10. Break Down the Barriers Between App & Infrastructure as Code Security

    Read this practical guide to learn how siloed approaches to detect cloud misconfigurations can be overcome by understanding context across the SDLC.

  11. Executive Personally Identifiable Information (PII): Managing Leadership Personal Information Risks

    Learn why a passive approach to addressing the range of privacy threats senior executives face is no longer enough to limit their risk.

  12. Cyber Threat Intelligence for Banking & Financial Services - Follow The Money

    Read this whitepaper, to learn the issues facing FSIs and how threat intelligence can mitigate the impact of a cyberattack.

What’s hot on Infosecurity Magazine?