Your Search

White Papers


1 - 12 of 200 results


Items per page:

Sort By
  • 2017 SSH Study - Reveals widespread...

    Company:   Venafi

    • D250

    A July 2017 survey of over 400 security professionals in the U.S., U.K. and Germany measured how well their organisations implemented security contro...

  • 2018 CISO Report

    Company:   Bugcrowd

    • H140

    Bugcrowd's annual CISO report outlining top investment goals and concerns.

  • 2018 Cost of Insider Threats: Global...

    Company:   ObserveIT

    • N60

    According to The Ponemon Institute’s report, “2018 Cost of Insider Threats: Global Organisations,” the average cost of an insider threat annually is $...

  • 2019 edgescan Vulnerability Stats...

    Company:   Edgescan

    • K140

    For our 4th Year running, welcome to the edgescan Vulnerability Stats Report. This report aims to demonstrate the state of fullstack security based on...

  • 3 Important Reasons for Privilege...

    Company:   Centrify

    • Q02
  • 5 Critical Steps of a Complete Security...

    Company:   Tripwire

    • E50

    Tackling the challenge of finding and resolving risk in enterprise while demonstrating compliance.

  • A Buyer's Guide to DMARC

    Company:   Red Sift

    • S159

    We’ve put our heads together and come up with a comprehensive buyer’s guide that’s perfect for any organization unsure about taking their first steps ...

  • A Risk-Aware Path To Cybersecurity...

    Company:   CMMI Institute

    • A100

    This white paper outlines the practical cybersecurity challenges in enterprises—challenges that are already acute and increase organizational and busi...

  • Adopt Robust Breach Detection and Meet...

    Company:   CounterCraft

    • G100

    GDPR, in its article 83, refers to the need for organisations to ensure that they have robust breach detection and investigation mechanisms in place. ...

  • Advanced Protection and Threat...

    Company:   Nuvias

    • E140

    Kaspersky Lab products for business are designed for businesses of all sizes, from networks that comprise only a handful of workstations to the most c...

  • AI and the problem with Privacy

    Company:   Gemserv

    • H166

    This article discusses how the General Data Protection Regulation (GDPR), if properly enforced, can support organisations deploying artificial intelli...

  • An Adaptive and Layered Approach to...

    Company:   Bitdefender

    • D70

    The increased awareness around the need to fortify endpoint security is well-founded: Endpoints play a central role as the entry point through which ...

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.