White Papers

TechRepublic's Resource Library is the web's largest directory of free vendor-supplied technical content. Take advantage of the library's white papers on an array of topics, from Big Data to cloud computing, mobility to security.

  • Email Fraud Threat Report

    White Papers // Apr 2018 // provided by Proofpoint

    Email fraud, also known as business email compromise (BEC), is one of today's greatest cyber-threats. These socially engineered attacks seek to exploit people rather than technology. They are highly targeted, sent in low volumes and impersonate people in authority. Email fraud preys on human nature - fear, the desire to ...

    Learn More
  • Top 5 Database Security Threats

    White Papers // Apr 2018 // provided by Imperva

    Data breaches are a threat to every organization. Breach damage goes beyond the loss or disclosure of sensitive or confidential data; companies incur significant financial costs associated with remediation and multi-year legal liability claims. This paper details the top 5 security threats to help organizations take steps to protect their ...

    Download Now
  • Dell Security - Evolving Security To Accommodate The Modern Worker

    White Papers // Apr 2018 // provided by Dell & Intel

    Technology is transforming how and where employees are working. Security teams must keep up and accommodate all types of workers.Employees need access to often sensitive information across a wide range of business applications and devices from wherever they are. In other words, security and privacy policies that doesn't impede end-user ...

    Download Now
  • The Imperva Incapsula DDoS Response Playbook

    White Papers // Apr 2018 // provided by Imperva

    Distributed denial of service (DDoS) attacks have become a fact of life for any business with a web presence. Whether you’re an enterprise, e-commerce business, local organization, or government offce—it’s merely a matter of time before you’re going to have to deal with the inevitable DDoS attack. The question is ...

    Download Now
  • THE SPECTRUM OF MOBILE RISK

    Tools & Templates // Apr 2018 // provided by Lookout

    Understanding the full range of risks to enterprise data from mobility.Lookout has developed the Mobile Risk Matrix to help organizations understand the components and vectors that make up the spectrum of mobile risk — and to provide data that will help enterprises gain a deeper understanding of the prevalence and ...

    Find Out More
  • 4 mobile security insights for CISOs

    White Papers // Apr 2018 // provided by Lookout

    Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps.Read the four mobile security insights CISOs must know to ...

    Learn More
  • The Spectrum of Mobile Risk: Understanding the full range of risks to enterprise data from mobility

    White Papers // Apr 2018 // provided by Lookout

    The time has come for enterprise risk management to change. Mobile devices have become core to our personal and professional lives, yet most enterprises remain focused on traditional PC endpoints.Although many of the same elements of risk that affect PCs also apply to mobile endpoints, simply extending current PC security ...

    Learn More
  • Gartner 2017 Magic Quadrant for SIEM

    White Papers // Apr 2018 // provided by Splunk

    Gartner recently published its 2017 Magic Quadrant (MQ) for Security Information and Event Management where Splunk was named a leader in the security information and event management (SIEM) market. Organizations around the world use Splunk Enterprise Security (ES) as their SIEM for security monitoring, advanced threat detection, forensics and incident ...

    Find Out More
  • Security Investigation, Detection & Rapid Response with Splunk Enterprise

    White Papers // Apr 2018 // provided by Splunk

    Hunting for an unknown threat or investigating an alert or breach can prove challenging and time-consuming for anyone - whether that's a dedicated analyst or a person that plays multiple roles. While having visibility across data silos is a great starting point, detecting and addressing threats over the long term ...

    Find Out More
  • The Six Essential Capabilities of an Analytics-Driven SIEM

    White Papers // Apr 2018 // provided by Splunk

    SIEMs offer a lot of promise, but legacy SIEMs simply can't keep up with the rate and sophistication of today's cyberattacks. Organizations today require access to analytics-driven SIEMs that combine a big data platform that is optimized for machine data with advanced analytics, threat detection, monitoring tools, incident response tools ...

    Read More