Infosecurity White Papers

Download and engage with the latest White Papers focused on Information Security strategy, technology & insight. Each White Paper is editorially approved to ensure the research presented is up to date, high quality and relevant to personal development or workplace implementation.

 

  1. Logpoint Emerging Threats Report: Russia v Ukraine. Round 2 Gamma Edition

    Discover how this cyber war has evolved since February 2022 and how Logpoint’s solutions and playbooks can help to prepare for, and respond to, an increase in Gamaredon malware.

  2. The New Standard in Cyber-Attack Recovery for ICS & OT

    In an increasingly interconnected world, critical infrastructures such as power grids, transportation networks, and water treatment facilities have become attractive targets for cybercriminals. Advanced Persistent Threats (APTs) have emerged as a significant threat, capable of causing extensive damage and disruption. Since cyber-attacks have become inevitable, mitigation is a must; This white paper presents an innovative solution for cyber- attacks on critical assets.

  3. Managed File Transfer for Enterprise: The Buyer’s Guide

    Info-Tech’s Data Quadrant Reports provide a comprehensive evaluation of popular products in the Managed File Transfer - Enterprise market. This buyer’s guide is designed to help prospective purchasers make better decisions by leveraging the experiences of real users.

  4. Three Ways to Spot Insider Risk

    The biggest challenge to spotting a threat is knowing what to look for.

  5. How to Choose a File Upload Security Solution for Web Applications

    Discover key strategies to fortify web applications against malicious file uploads with this comprehensive guide.

  6. Last Line of Defense Against Ransomware

    Ransomware is everywhere, and it’s not slowing down – read about what should strategically be in place to ensure that your data is full protected.

  7. The Difference Between Insider Risk and Insider Threat

    Threats and risks, they both sound dangerous, but they are not the same, and companies who manage risk effectively can minimize threats.

  8. Businesses Need Managed File Transfer

    Compared to using a variety of standalone FTP and SFTP tools, MFT technology allows professionals to streamline how data is transferred. This helps organizations do things like send and receive files in their cloud and private networks, create and control workflows, and automate transfers.

  9. Defending Data Against Ransomware

    Learn how to protect your data, even in worst-case scenarios, with this white paper that talks through benefits of software and hardware precautions to take. With increased occurrences in cyber-attacks and ransomware crime, it’s never been more important to ensure your critical data is protected.

  10. NIS2 - What is it and how it impacts cybersecurity

    NIS2 is an EU directive adopted by the EU parliament in November 2022. It aims to protect critical infrastructure within the EU from cyber threats and to achieve a high level of security across the EU.

  11. Secure Enterprise Network Traffic Against Modern Cyberthreats

    Learn how to effectively protect enterprise network traffic from file-based exploits and attacks with ICAP content inspection.

What’s hot on Infosecurity Magazine?