White Papers

TechRepublic's Resource Library is the web's largest directory of free vendor-supplied technical content. Take advantage of the library's white papers on an array of topics, from Big Data to cloud computing, mobility to security.

  • Top 5 Database Security Threats

    White Papers // Apr 2018 // provided by Imperva

    Data breaches are a threat to every organization. Breach damage goes beyond the loss or disclosure of sensitive or confidential data; companies incur significant financial costs associated with remediation and multi-year legal liability claims. This paper details the top 5 security threats to help organizations take steps to protect their ...

    Download Now
  • How to Build a DDoS Response Plan in 7 Steps

    White Papers // Apr 2018 // provided by Imperva

    You’ve probably heard about distributed denial of service (DDoS) attacks, or maybe you’ve even been hit by one. If you’re like most organizations, you’ve already been DDoSed. Perhaps the attack was minor, a wakeup call, but then the attack subsided without causing damage and you just left DDoS protection on ...

    Download Now
  • Dell Security - Evolving Security To Accommodate The Modern Worker

    White Papers // Apr 2018 // provided by Dell & Intel

    Technology is transforming how and where employees are working. Security teams must keep up and accommodate all types of workers.Employees need access to often sensitive information across a wide range of business applications and devices from wherever they are. In other words, security and privacy policies that doesn't impede end-user ...

    Download Now
  • GDPR: New Data Protection Rules in the EU

    White Papers // Apr 2018 // provided by Imperva

    The European Union is changing the way it regulates data protection in the wake of large-scale cyber attacks and data loss incidents. This paper looks at the new data security requirements under the GDPR and provides practical tips on how to prevent a data breach disaster from happening to you ...

    Download Now
  • Five Security Strategies for DevOps, APIs and Microservices

    White Papers // Apr 2018 // provided by Imperva

    The modern application world is an even bigger playground for cybercriminals. What’s at stake and what’s the best way to protect your data? In Five Security Strategies for DevOps, APIs and Microservices, discover the key vulnerabilities inherent to today’s environment and the best data defense strategies to keep your applications ...

    Download Now
  • The Imperva Incapsula DDoS Response Playbook

    White Papers // Apr 2018 // provided by Imperva

    Distributed denial of service (DDoS) attacks have become a fact of life for any business with a web presence. Whether you’re an enterprise, e-commerce business, local organization, or government offce—it’s merely a matter of time before you’re going to have to deal with the inevitable DDoS attack. The question is ...

    Download Now
  • THE SPECTRUM OF MOBILE RISK

    Tools & Templates // Apr 2018 // provided by Lookout

    Understanding the full range of risks to enterprise data from mobility.Lookout has developed the Mobile Risk Matrix to help organizations understand the components and vectors that make up the spectrum of mobile risk — and to provide data that will help enterprises gain a deeper understanding of the prevalence and ...

    Find Out More
  • 4 mobile security insights for CISOs

    White Papers // Apr 2018 // provided by Lookout

    Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps.Read the four mobile security insights CISOs must know to ...

    Learn More
  • The Spectrum of Mobile Risk: Understanding the full range of risks to enterprise data from mobility

    White Papers // Apr 2018 // provided by Lookout

    The time has come for enterprise risk management to change. Mobile devices have become core to our personal and professional lives, yet most enterprises remain focused on traditional PC endpoints.Although many of the same elements of risk that affect PCs also apply to mobile endpoints, simply extending current PC security ...

    Learn More
  • Highly secure network access for small businesses in Thailand

    White Papers // Apr 2018 // provided by Cisco 

    Securely connecting your business to the Internet and out-of-office employees with Cisco RV340 Router is easy. Now they are available at attractive prices.

    Find Out More