ISSA White Papers

(View All Report Types)
The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012


Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011


The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012


Rise in Ransomware Attacks Prompts New Prevention Priorities
sponsored by Cisco Umbrella
EGUIDE: Officials predict that already widespread ransomware attacks will only grow in scale and influence, while urging organizations to act now to guard against them. In this e-guide, learn what officials are saying about the upcoming storm of ransomware attacks and what your company can do in terms of prevention.
Posted: 11 Feb 2020 | Published: 11 Feb 2020

Cisco Umbrella

The Transformational CISO’s Guide to Security Orchestration, Automation and Response
sponsored by Splunk
EBOOK: The role of the CISO is changing and the most successful organizations are recognizing that genuine digital and business transformation depends on security modernization. Tap into this e-book to learn how SOAR can help many of the biggest challenges facing CISOs.
Posted: 19 Aug 2022 | Published: 19 Aug 2022


How To Achieve Risk-Based Vulnerability Management
sponsored by AT&T Cybersecurity
WHITE PAPER: Information overload challenges from data and threats can overwhelm cybersecurity professionals, causing many to unwisely skip vulnerability mitigation. Consequently, some organizations are operating at unacceptably high levels of risk. Read this guide to understand the framework of a modern, risk-based vulnerability management program.
Posted: 09 Apr 2021 | Published: 09 Apr 2021

AT&T Cybersecurity

Close The Cyber Security Skills Gap
sponsored by Mandiant
PRODUCT OVERVIEW: The cybersecurity skills gap looms over the heads of security professionals looking to increase their teams’ performances. This overview looks at how Mandiant helps organizations overcome the skills gap by offering access to experts, training, and cyber security certifications, to provide effective and efficient security. Read on to learn more.
Posted: 07 Apr 2023 | Published: 07 Apr 2023


How to Properly Plan Against Attacks with Incident Response and Advanced Malware Protection
sponsored by TaaSera
EGUIDE: This expert e-guide explores the dos and don'ts of creating an incident response plan and looks at how advanced malware uses your own network against you.
Posted: 02 Dec 2014 | Published: 02 Dec 2014


The Case for CyberRisk Management Platforms
sponsored by SimSpace
ESG: This ESG white paper, The Case for Cyber Risk Management Platforms, uncovers why these platforms are rapidly becoming a foundational requirement for enterprise security programs. Read on to discover cyber risk management platforms' efficiencies and why they are vastly becoming crucial to the security ecosystem.
Posted: 29 Apr 2022 | Published: 30 Apr 2022


Computer Weekly - 29 November 2011: Read this week’s issue of the UK’s leading technology publication, featuring the latest news, analysis and opinion about UK IT
sponsored by TechTarget
EZINE: In this week's Computer Weekly, we go behind the scenes at the datacentre that knows everything about you, at credit checking firm Experian. We analyse the government's new plans to change the way it works with IT suppliers; and kick-off our Buyer's Guide to outsourcing with a look at the latest trends. Download the new issue now.
Posted: 28 Nov 2011 | Published: 28 Nov 2011


5 Digital Transformation Priorities for Financial Services
sponsored by Comcast Business
WHITE PAPER: Browse this paper for an in-depth look at 5 focus areas financial services organizations should prioritize when enhancing customer experience (CX).
Posted: 23 May 2023 | Published: 23 May 2023

Comcast Business

Dedicated to Information Security: The High-Stakes Role of the CISO
sponsored by TechTarget Security
EZINE: Almost 20 years into its existence, the CISO job is still open to discussion. In this issue of Information Security, we look at the role's influence on broader security initiatives, plus challenges of the job and the changes ahead. Download now and you'll also get tips on implementing cyberthreat intelligence, a CISO Q&A, and more.
Posted: 01 Dec 2016 | Published: 01 Dec 2016

TechTarget Security

How to Solve Security Problems Within Your Organization
sponsored by Wisegate
EGUIDE: Access this e-guide for expert insight on the need for risk management, and why data protection alone isn't enough. Click now to explore how proper education will enable a more robust and knowledgeable IT security team.
Posted: 02 Dec 2013 | Published: 02 Dec 2013


Tips on Managing the Deluge of Information Security Threat Reports
sponsored by TechTarget Security
EGUIDE: Don't get overwhelmed by today's cyber-attacks: Access this expert e-guide to take advantage of threat report data and use it as actionable intelligence. Read on to discover the real impact of insider security threats.
Posted: 02 Dec 2013 | Published: 02 Dec 2013

TechTarget Security

Modernize Your Threat Intelligence Platform
sponsored by ThreatConnect
EBOOK: To combat the inherent asymmetric informational disadvantage, security teams can use cyber threat intelligence (CTI) to assess whether alerts or events are meaningful within the context of broader situational awareness. Learn how to build an effective CTI operations function by downloading this e-book.
Posted: 11 Jan 2023 | Published: 11 Jan 2023


Cloud Risk Management: Governance Strategies to Protect Digital Assets
sponsored by TechTarget Security
EBOOK: In this handbook, learn data protection techniques for the public and private cloud, including advice to mitigate cloud data risks, implement information security best practices and determine what cloud data protection approach is best for your organization.
Posted: 05 Oct 2015 | Published: 05 Oct 2015

TechTarget Security

Transform to Better Perform: Evolve Your Data Center
sponsored by Dimension Data
WHITE PAPER: Modern business changes fast. Learn how aging infrastructure stifles innovation and growth to hold your company back.
Posted: 22 Feb 2016 | Published: 22 Feb 2016

TOPICS:  IT Management
Dimension Data

4 Ways XDR Levels Up Security Programs
sponsored by Rapid7
WHITE PAPER: With complex cyberattacks on the rise, how can your business boost its security program’s defenses? Step in XDR (Extended Detection and Response). This white paper presents 4 ways that XDR can enhance security programs. #1: Simplifies SecOps by providing precise, speedy insights. Keep reading to unlock the rest.
Posted: 05 Jan 2023 | Published: 05 Jan 2023


The Benefits of Automating Security with SOAR Tools
sponsored by ServiceNow
EGUIDE: Security professionals are struggling to keep up with today's threat landscape as they continue to deal with security alert overload and the cybersecurity skills shortage. However, deploying SOAR tools can aid security teams with improving everyday processes. In this e-guide, learn how SOAR tools can improve your cybersecurity program.
Posted: 08 Feb 2021 | Published: 25 Oct 2019


Computer Weekly 8 November 2011: Read this week's issue of the UK's leading technology publication, with the news, analysis and opinion that matters to IT managers.
sponsored by TechTarget
EZINE: In this week's Computer Weekly, we report from the London Cyberspace Conference where world leaders gathered to discuss internet security. We examine the tools available to help migrate from Windows XP to Windows 7; and hear from Royal Bank of Scotland about how to build a business case for virtual desktops. Download the new issue now.
Posted: 07 Nov 2011 | Published: 04 Nov 2011


Protecting Applications, Data, and Users with Next-Generation CASB
sponsored by Palo Alto Networks
ESG: With hundreds of SaaS applications, each with a unique mix of settings, it can be difficult for IT and security teams to ensure resources are properly configured, protected, and compliant. Download this ESG white paper to explore today’s changing IT environments in detail and unlock key attributes for next-generation CASBs.
Posted: 24 Mar 2023 | Published: 25 Mar 2023

Palo Alto Networks

CIO Decisions E-zine: May 2014
sponsored by TechTarget CIO
EZINE: Innovations of the new mobility age, including the connected car, mean that CIOs need to reframe their mobile strategy with a customer-focused slant.
Posted: 05 May 2014 | Published: 07 May 2014

TechTarget CIO

Information Security Magazine – October 2010: Database Auditing Tools – The Human Factor
sponsored by Information Security Magazine
WHITE PAPER: This issue also discusses database audit tools, applications and the selection process. Learn how your organization can leverage these tools to understand database transaction activity, monitor insiders for malicious activity, and how these logs and audit trails can improve your compliance programs.
Posted: 07 Oct 2010 | Published: 07 Oct 2010

Information Security Magazine

Computer Weekly 13 September 2011: Download this week's issue of the UK's leading technology publication, with our analysis of the latest news, trends and IT management issues
sponsored by TechTarget
EZINE: In this week's Computer Weekly, we talk to the man tasked with bringing public services into the digital age. The second installment of our Buyer's Guide to business intelligence reviews two low-cost alternatives to the big suppliers; and we go behind the scenes of the IT preparations for the London 2012 Olympic Games.
Posted: 12 Sep 2011 | Published: 13 Sep 2011


Data Center Evolution in the Era of the Cloud
sponsored by Dimension Data
WHITE PAPER: Data centers are crucial to the changing business world. Learn to handle growing data, add new applications and more.
Posted: 22 Feb 2016 | Published: 22 Feb 2016

TOPICS:  IT Management
Dimension Data

New Mobile Risks Call for a Layered Security Approach
sponsored by TechTarget CIO
EBOOK: As enterprises' mobile footprints grow, so do the security risks. A single-pronged security approach is no longer enough. Download this handbook to discover how to build a layered enterprise mobile security strategy.
Posted: 09 Aug 2016 | Published: 09 Aug 2016

TechTarget CIO

Security Operations Use Case Guide
sponsored by ServiceNow ValueFlow
WHITE PAPER: The skills shortage and increasing cyberattacks continue to challenge security teams, slowing their responses to security incidents. These slow responses can have drastic consequences. To help teams avoid disaster, ServiceNow developed Security Operations and the Now Platform. Learn about how these solutions work in this guide.
Posted: 19 Apr 2023 | Published: 19 Apr 2023

ServiceNow ValueFlow

Security Operations Use Case Guide
sponsored by ServiceNow and Thirdera
WHITE PAPER: The skills shortage and increasing cyberattacks continue to challenge security teams, slowing their responses to security incidents. These slow responses can have drastic consequences. To help teams avoid disaster, ServiceNow developed Security Operations and the Now Platform. Learn about how these solutions work in this guide.
Posted: 31 Mar 2023 | Published: 01 Apr 2023

ServiceNow and Thirdera