Whitepapers
Cyber Security Hub provides enterprise security professionals with the most comprehensive selection of cyber security whitepapers from our own network or cyber security experts. All Cyber Security Hub members can research and be informed on a variety of topics through our collection of whitepapers.
A guide to Singapore’s Safer Cyberspace Masterplan
November 25 by Cyber Security Hub EditorRead this guide to understand specific cyber security focus areas and how to ensure your organization is protected
The IT guide to data security and governance
November 23 by Cyber Security Hub EditorFind out how to innovate endlessly and boost data security in a digital-first world
CISO strategy and planning: Connecting the technology dots to business objectives
October 12 by Cyber Security Hub EditorThis Blue Lava eBook provides security leaders with guidance on how InfoSec can better enable and protect business objectives
What you need to know when building a VRM program
September 29 by Cyber Security Hub EditorOneTrust offers an in-depth dive into the fast-growing discipline of Vendor Risk Management via this ebook
A practical guide to effective container security
September 15 by Cyber Security Hub EditorFind out how why the container model can result in a more distributed application architecture and greater ease of use
The Eight Phases of Third-Party Risk Management
August 30 by Cyber Security Hub EditorBy understanding the TPRM lifecycle, organizations can save time and resources, while also reducing risk
DeadRinger: Exposing Chinese threat actors targeting major telcos
August 23 by Cyber Security Hub EditorDownload this report to discover how the Cybereason Nocturnus Team was able to identify threat actors targeting Southeast Asia’s telecommunications industry
5 Tips On How To Move to DevSecOps With Ease
August 09 by Seth AdlerSecurity must be embedded into developer workflows during every stage of the SDLC. Software development, delivery, and deployment is a continuous process. Be part of securing it! This infographic provides 5 tips to help you move to a DevSecOps environment with ease.
Hacker's Almanac
July 22 by Seth AdlerThis guide serves as a cornerstone for understanding: The current threat landscape; Why your organization is at risk; How to determine your distributed attack surface; How attackers are targeting your organization
5 Reasons Why Software Security is More Critical Than Ever
July 12 by Seth AdlerDownload the piece to overcome the following challenges: Software is every organization’s weakest link; Developers are in overdrive, making security an afterthought; Software security is at the heart of digital transformation.
Hacker Report 2021
July 05 by Seth AdlerDownload this report to realize: What motivates hackers to hack? What technologies are hackers working on? Which industries are hackers working with?
Total Economic Impact Of Security Operations Solutions
June 21 by Seth AdlerDownload this report to realize: Key challenges the interviewed customers experienced; Increased efficiency of prioritization and resolution of security incidents, resulting in $4.9 million in benefits; Better visibility into security posture