Magazine Button

Whitepapers

The latest Whitepapers can be found below, if you are looking for something specific, please select the company from the drop down menu below to view their Whitepapers.

Abnormal

Mace Reinforces Trust, Builds Efficiency with Behavioural AI-Based Email Security

NEW

Mace Reinforces Trust, Builds Efficiency with Behavioural AI-Based Email Security

Mace Reinforces Trust, Builds Efficiency with Behavioural AI-Based Email Security

NEW

Mace Reinforces Trust, Builds Efficiency with Behavioural AI-Based Email Security

2023 Gartner® Market Guide for Email Security

NEW

2023 Gartner® Market Guide for Email Security

CISO Guide To Generative AI Attacks

NEW

CISO Guide To Generative AI Attacks

The State of Email Security in an Al-Powered World

NEW

The State of Email Security in an Al-Powered World

The Total Economic Impact™ Of Abnormal Security

NEW

The Total Economic Impact™ Of Abnormal Security

Corelight

How to threat hunt with Open NDR + MITRE ATT&CK®

NEW

How to threat hunt with Open NDR + MITRE ATT&CK®

Complete visibility with Open NDR

NEW

Complete visibility with Open NDR

sosafe

Análisis del riesgo humano 2023

NEW

Análisis del riesgo humano 2023

Exterro

Forensic Investigations in a Zero Trust Environment

NEW

Forensic Investigations in a Zero Trust Environment

Juniper Networks

Session Smart Routing Datasheet

NEW

Session Smart Routing Datasheet

Session Smart Routing- How It Works

NEW

Session Smart Routing- How It Works

Levi, Ray & Shoup

Large Manufacturer centralizes printing after Cyber-attack

NEW

Large Manufacturer centralizes printing after Cyber-attack

What is Cloud Printing?

NEW

What is Cloud Printing?

Palo Alto Networks

Defend Your Business Against Web-Based Threats

NEW

Defend Your Business Against Web-Based Threats

Navigate the changing SASE landscape.

NEW

Navigate the changing SASE landscape.

2022 Award Write Up Palo Alto Networks SD WAN Award

NEW

2022 Award Write Up Palo Alto Networks SD WAN Award

From the Node Up: The Complete Guide to Kubernetes Security

NEW

From the Node Up: The Complete Guide to Kubernetes Security

A 2022 Gartner® Customers’ Choice for SSE

NEW

A 2022 Gartner® Customers’ Choice for SSE

Behind the need for next-generation sd-wans

NEW

Behind the need for next-generation sd-wans

Top Cybersecurity Trends for 2024

NEW

Top Cybersecurity Trends for 2024

Driving the future of work through enterprise-wide SASE

NEW

Driving the future of work through enterprise-wide SASE

Create an AI-Fueled SOC

NEW

Create an AI-Fueled SOC

Extend Your Network Security to Where You Need It

NEW

Extend Your Network Security to Where You Need It

How Six Organizations Transformed Their Networking and Security with Prisma SASE

NEW

How Six Organizations Transformed Their Networking and Security with Prisma SASE

Top 10 CI/CD Security Risks

NEW

Top 10 CI/CD Security Risks

Software Supply Chain Security Checklist

NEW

Software Supply Chain Security Checklist

The 10 Tenents of an Effective SASE Solution

NEW

The 10 Tenents of an Effective SASE Solution

Why Prisma SD-WAN is the solution youve been looking for

NEW

Why Prisma SD-WAN is the solution youve been looking for

Secure Your Containers with Confidence

NEW

Secure Your Containers with Confidence

Explore 107% ROI with Prisma SASE

NEW

Explore 107% ROI with Prisma SASE

ZTNA 2.0 The New Standard for Securing Access

NEW

ZTNA 2.0 The New Standard for Securing Access

Secure remote access. Simplified.

NEW

Secure remote access. Simplified.

The Only Vendor to Be Recognized as a Leader in SD-WAN, SSE and Single-Vendor SASE

NEW

The Only Vendor to Be Recognized as a Leader in SD-WAN, SSE and Single-Vendor SASE

O’Reilly Cloud Native Security Cookbook – Recipes for a Secure Cloud

NEW

O’Reilly Cloud Native Security Cookbook – Recipes for a Secure Cloud

Palo Alto Networks Recognized as a Leader in IDC MarketScape for SD-WAN

NEW

Palo Alto Networks Recognized as a Leader in IDC MarketScape for SD-WAN

Guide to Cloud Security Posture Management Tools

NEW

Guide to Cloud Security Posture Management Tools

The Power of Next-Generation SD-WAN with App-Defined Fabric

NEW

The Power of Next-Generation SD-WAN with App-Defined Fabric

The Total Economic Impact Of Palo Alto Networks Prisma Cloud

NEW

The Total Economic Impact Of Palo Alto Networks Prisma Cloud

Prisma SASE: Your branch has changed. Your SD-WAN should, too.

NEW

Prisma SASE: Your branch has changed. Your SD-WAN should, too.

Cloud native Security Maturity: Using Security to Drive Software Development Efficiency

NEW

Cloud native Security Maturity: Using Security to Drive Software Development Efficiency

SD-WAN: Protect Branches with Zero Trust

NEW

SD-WAN: Protect Branches with Zero Trust

The DevSecGuide to Kubernetes

NEW

The DevSecGuide to Kubernetes

New Gartner®️ report on Zero Trust Network Access

NEW

New Gartner®️ report on Zero Trust Network Access

SaaS Driven. CASB Protected.

NEW

SaaS Driven. CASB Protected.

Proofpoint

Metrics That Matter ebook

NEW

Metrics That Matter ebook

Cloud Account Compromise and Takeover

NEW

Cloud Account Compromise and Takeover

Proofpoint Supplier Threat Protection DATA SHEET

NEW

Proofpoint Supplier Threat Protection DATA SHEET

Driving Real Behaviour Change ebook

NEW

Driving Real Behaviour Change ebook

2024 State of the Phish Report

NEW

2024 State of the Phish Report

The Proofpoint Security Awareness Handbook

NEW

The Proofpoint Security Awareness Handbook

Metrics That Matter: The CISO’s Guide to Assessing, Prioritizing and Justifying Cybersecurity Budgets That Make Business Sense

NEW

Metrics That Matter: The CISO’s Guide to Assessing, Prioritizing and Justifying Cybersecurity Budgets That Make Business Sense

Securing the Messenger: Best practices for safeguarding transactional email and breaking the supplier attack chain whitepaper

NEW

Securing the Messenger: Best practices for safeguarding transactional email and breaking the supplier attack chain whitepaper

DMARC: The key to deliverability

NEW

DMARC: The key to deliverability

How Proofpoint EFD Is More Than Just DMARC

NEW

How Proofpoint EFD Is More Than Just DMARC

How Proofpoint Defends Against Cloud Account Takeover

NEW

How Proofpoint Defends Against Cloud Account Takeover

Bilfinger Protects Supply Chain Email Communications with Proofpoint Email Fraud Defense

NEW

Bilfinger Protects Supply Chain Email Communications with Proofpoint Email Fraud Defense

AGRAVIS Protects Critical Networks for Agricultural Solutions With Proofpoint

NEW

AGRAVIS Protects Critical Networks for Agricultural Solutions With Proofpoint

Advanced Email Security

NEW

Advanced Email Security

Measuring Security Awareness Impact for Long-Term Success

NEW

Measuring Security Awareness Impact for Long-Term Success

Supply Chain Attacks

NEW

Supply Chain Attacks

Turning the Tables

NEW

Turning the Tables

University of Surrey’s Edification for its Cyber Protection

NEW

University of Surrey’s Edification for its Cyber Protection

Phish in a Barrel – What users don’t know about cyber threats—and why it can hurt them

NEW

Phish in a Barrel – What users don’t know about cyber threats—and why it can hurt them

Securing Microsoft 365

NEW

Securing Microsoft 365

The Cost of ‘Good Enough’ Security ebook

NEW

The Cost of ‘Good Enough’ Security ebook

How Proofpoint Defends Against Ransomware solution brief

NEW

How Proofpoint Defends Against Ransomware solution brief

The Business Email Compromise (BEC) Handbook

NEW

The Business Email Compromise (BEC) Handbook

Recorded Future

It’s Time to Take a New Approach to Identity Fraud Protection

NEW

It’s Time to Take a New Approach to Identity Fraud Protection

Ransomware: Understand. Prevent. Recover.

NEW

Ransomware: Understand. Prevent. Recover.

Browse our latest issue

Intelligent CISO

View Magazine Archive