Cybersecurity

Cybersecurity White Papers (View All Report Types)
All together now
sponsored by ServiceNow
WHITE PAPER: 2020 has been a disastrous and disruptive year for organizations and their security programs. Upticks in cyberattacks – like malware – have led to significant and costly breaches. Read this white paper to learn more about the effects of 2020 and how IT and security teams can collaborate to drive operational resilience against today’s threats.
Posted: 14 Apr 2022 | Published: 14 Apr 2022

ServiceNow

Policy-Driven Solutions for Secure Data Exchange
sponsored by PKWare
WHITE PAPER: Protecting essential data exchanges is an increasingly important business imperative. Read this white paper to learn about the importance of encryption, common challenges, how to apply policy-driven security to data exchanges, and more.
Posted: 26 Jan 2022 | Published: 19 Apr 2021

TOPICS:  Cybersecurity
PKWare

A Blueprint for Data-Centric Security
sponsored by PKWare
WHITE PAPER: Data-centric security is a fundamentally different approach for protecting sensitive data from theft or misuse – but how should organizations go about embracing this new approach? Read this white paper to discover the key principles of data-centric security, along with best practices for designing and building an effective program.
Posted: 26 Jan 2022 | Published: 14 Apr 2021

TOPICS:  Cybersecurity
PKWare

The Entropy Problem
sponsored by PKWare
WHITE PAPER: The unpredictability of data is what gives encryption it’s strength – so approaches that stifle the “randomness” of the process also present weakness. Read this white paper to learn more about modern encryption and the entropy problem.
Posted: 26 Jan 2022 | Published: 20 Apr 2021

TOPICS:  Cybersecurity
PKWare

Simplify PCI Compliance with Smarter Scope Management
sponsored by PKWare
WHITE PAPER: As organizations around the globe prepare for the newest version of PCI DSS, it’s important to revisit some of the basics of the regulation. Read this white paper for an overview of PCI DSS and discover how to minimize risk and cost without sacrificing compliance.
Posted: 26 Jan 2022 | Published: 15 Apr 2021

TOPICS:  Cybersecurity
PKWare

How To Keep Apis Secure From Bot Cyberattacks
sponsored by Radware
WHITE PAPER: APIs remain one of the most lucrative and accessible targets for today’s sophisticated bot attacks. In this white paper, you’ll learn how to prepare your APIs to defend against bot attacks by looking at common vulnerability areas, attack symptoms, and more – read on to get started.
Posted: 18 Nov 2021 | Published: 08 Apr 2021

TOPICS:  Cybersecurity
Radware

Unmasking BEC And EAC
sponsored by Proofpoint
WHITE PAPER: The FBI has recognized business email compromise (BEC) and email account compromise (EAC) as one of the most pervasive and costliest cyberthreats in circulation. In fact, the average attack nets the attacker nearly $130,000. To learn more about BEC and EAC and how to prevent it, read this e-book.
Posted: 18 Nov 2021 | Published: 12 Mar 2021

TOPICS:  Cybersecurity
Proofpoint

The Hidden Costs Of Free
sponsored by Proofpoint
WHITE PAPER: As organizations opt for third-party email platforms, like Microsoft 365, it becomes increasingly critical that they ensure security is up to snuff. Unfortunately, Microsoft 365’s native security features may not be best-fit for every user. Read this e-guide to learn more about how to make the most out of Microsoft 365.
Posted: 18 Nov 2021 | Published: 10 Mar 2021

TOPICS:  Cybersecurity
Proofpoint

The Definitive Email Security Strategy Guide: A People-Centric Approach to Stopping Malware, Phishing, and Email Fraud
sponsored by Proofpoint
WHITE PAPER: With 94% of external cyber threats start with email, organizations need to ensure that their email security strategy can keep pace with this growing threat landscape. This white paper explores a new, people-centric approach to email security and provides you with a comprehensive guide for implementing this approach (including a checklist).
Posted: 18 Nov 2021 | Published: 05 Jun 2020

Proofpoint

MSPs: REQUIREMENTS FOR PROVIDING YOUR CLIENTS WITH LEADING RANSOMWARE PROTECTION
sponsored by Malwarebytes
WHITE PAPER: Ransomware is a major threat to any MSP’s clients—including yours—as 68.5% of organizations worldwide are impacted by it, according to Statistica. Access this short white paper to learn what sort of endpoint protection MSPs should look for and see how Malwarebytes meets your ransomware needs.
Posted: 17 Nov 2021 | Published: 17 Nov 2021

TOPICS:  Cybersecurity
Malwarebytes

Cyber-Security Checklist
sponsored by Vodafone
WHITE PAPER: Today’s workforce handling sensitive data remotely is essential to keep your business operational and profitable. But, according to a recent report, 10,000 cyberattacks are made against small businesses in the UK every day. Download this e-guide to unlock a checklist of the 13 cybersecurity best practices.
Posted: 26 Oct 2021 | Published: 26 Oct 2021

TOPICS:  Cybersecurity
Vodafone

Six Myths of SIEM
sponsored by IBM
WHITE PAPER: Traditionally, SIEM solutions were complex and targeted towards larger organizations. But with the need for security solutions ever-increasing, progressive SIEM vendors cater to businesses of all sizes.In this white paper, uncover the top 6 myths about SIEM and what organizations should expect from SIEM today. Read on to learn more.
Posted: 20 Oct 2021 | Published: 06 Oct 2020

IBM

5 key questions to optimizing security log management
sponsored by Graylog
WHITE PAPER: While most security experts agree that event log data provides much-needed visibility into the threats facing your environment, many lack the time to collect, manage and correlate log data. Read this white paper to learn more about implementing centralized log management, including 5 key questions to ask to optimize security log management.
Posted: 12 Aug 2021 | Published: 12 Aug 2021

TOPICS:  Cybersecurity
Graylog

Device Identity and Component Attestation comes to HPE Gen10 Plus Servers
sponsored by HPE and Intel®
WHITE PAPER: Explore this white paper to learn how the use of IDevIDs on HPE Gen10 Plus servers and systems broadens HPE’s existing support for IDevID, leading to benefits like extended Zero Trust capabilities and HPE as-a-service management offerings.
Posted: 30 Jul 2021 | Published: 30 Jul 2021

TOPICS:  Cybersecurity
HPE and Intel®

What is IoMT Security?
sponsored by Palo Alto Networks
WHITE PAPER: The Internet of Things (IoT) looks drastically different depending on industry vertical. This white paper explores the IoT subclassification known as the Internet of Medical Things (IoMT), which encompasses any device connected to a healthcare provider’s network. Read on to learn about IoMT adoption and how to secure IoMT devices.
Posted: 24 May 2021 | Published: 24 May 2021

TOPICS:  Cybersecurity
Palo Alto Networks

Five Things to Consider Before Embarking on a SASE Project
sponsored by Palo Alto Networks
WHITE PAPER: Coined by Gartner, the concept of SASE was created to help organization converge their networking and security efforts in the cloud. Read this white paper to unlock 5 key considerations your organization should think about before embarking on a SASE project.
Posted: 14 May 2021 | Published: 14 May 2021

TOPICS:  Cybersecurity
Palo Alto Networks

It’s Time To Say Goodbye To Vpns The Advantages Of Zero-Trust Network Access (ZTNA)
sponsored by Fortinet, Inc.
WHITE PAPER: More than half of the working population is expected to remain remote, even after the pandemic ends. In order to ensure workers are adequately protected, organizations are looking for better alternatives to the traditional VPN. Read this white paper to learn why ZTNA is the new VPN.
Posted: 06 May 2021 | Published: 06 May 2021

TOPICS:  Cybersecurity
Fortinet, Inc.

Security Is The Key To A Dependable SD-Branch Solution
sponsored by Fortinet, Inc.
WHITE PAPER: In the era of remote work and SD-WAN, cybersecurity at the WAN, LAN and IoT device edge has becoming a growing priority. Read this white paper to learn about the role of effective security in enabling a dependable SD-Branch solution.
Posted: 05 May 2021 | Published: 05 May 2021

TOPICS:  Cybersecurity
Fortinet, Inc.

Why are Acronis Cyber Protection Solutions Threatagnostic?
sponsored by Acronis
WHITE PAPER: Security professionals must both account for the many types of cyberattacks and apply security controls to different vectors through which these attacks can make their way in. In this white paper, read up on threat vectors, cyberattack techniques, types of malware and fileless attacks, and see how Acronis can help you fight them all.
Posted: 14 Apr 2021 | Published: 31 Dec 2020

Acronis

Your Organization’s Role In The Shared Responsibility Model
sponsored by Cloudcheckr
WHITE PAPER: The shared responsibility model offers cloud users and providers a more concrete understanding of the security responsibilities for each party. Read this e-guide to learn more about the shared responsibility model, the key challenges of cloud security, the importance of automation, and more.
Posted: 08 Apr 2021 | Published: 08 Apr 2021

TOPICS:  Cybersecurity
Cloudcheckr

The Industrialization of Fraud: Fighting Fire With Fire
sponsored by F5 Inc.
WHITE PAPER: This white paper, The Industrialization of Fraud: Fighting Fire with Fire, provides exclusive insight into sophisticated fraud strategies and tactics, as well as a series of best practices that can be implemented to thwart fraud attempts. Read on to learn more.
Posted: 31 Mar 2021 | Published: 30 Nov 2020

TOPICS:  Cybersecurity
F5 Inc.

Securing Multi-Cloud Environments with VM-Series Virtual Firewalls
sponsored by Palo Alto Networks
WHITE PAPER: Today’s complex multi-cloud environments can pose serious security concerns for underprepared organizations. Read this white paper to learn how Palo Alto is helping organizations embrace cloud-agnostic network security that boosts application threat prevention.
Posted: 24 Mar 2021 | Published: 24 Mar 2021

TOPICS:  Cybersecurity
Palo Alto Networks

Five Best Practices for Mitigating DDoS Attacks
sponsored by Cloudflare
WHITE PAPER: In this white paper, unlock 5 best practices to help your organization defend against rapidly evolving Distributed Denial-of-Service (DDoS) threats and address vulnerabilities at every layer.
Posted: 23 Mar 2021 | Published: 23 Mar 2021

TOPICS:  Cybersecurity
Cloudflare

The Seven Elements of Secure Product Development
sponsored by Coalfire
WHITE PAPER: Applications are an attractive target for cybercriminals. And despite security and penetration efforts, apps continue to be on the receiving end of a data breach. Read this whitepaper to learn 7 practices you can implement to best protect your critical applications.
Posted: 19 Mar 2021 | Published: 19 Mar 2021

TOPICS:  Cybersecurity
Coalfire

Your Roadmap To The Fast Lane of digital Transformation
sponsored by Magna5
WHITE PAPER: Managed security services are a critical part of any digital transformation initiative, but their capabilities go beyond accelerating and modernizing your technologies, tools and processes. Read this whitepaper to learn more about the potential benefits and use cases for managed security services.
Posted: 17 Mar 2021 | Published: 17 Mar 2021

TOPICS:  Cybersecurity
Magna5