Whitepapers
Cyber Security Hub provides enterprise security professionals with the most comprehensive selection of cyber security whitepapers from our own network or cyber security experts. All Cyber Security Hub members can research and be informed on a variety of topics through our collection of whitepapers.
Modern SOC: How to leverage AI-based SecOps & quantify the value of cyber security
February 29 by CSHub.com Editorial StaffDelving into the inefficiencies and scaling issues associated with security operations centers, this paper focuses on the transformative impact of artificial intelligence on cyber security
Cyber security guide to third-party risk management
February 01 by CSHub.com Editorial StaffLearn how to build a TPRM program that effectively manages third-party risks
The what, why and how of Zero Trust network architecture
November 15 by CSHub.com Editorial StaffLearn how the Zero Trust security model works, the challenges it solves, its logical components, and the various ways in which it can be deployed
How to think like a hacker and secure your data
June 23 by CSHub.com Editorial StaffA guide to using hacking techniques to reinforce your data protection strategy
Changing times in DevSecOps playbook
June 15 by CSHub.com Editorial StaffWhy modern security teams need a transformation and how they can do it
Reducing fraud and friction in consumer experiences
May 23 by CSHub.com Editorial StaffHow to protect customers without impacting the customer onboarding experience
Gaining control of financial services cyber security regulations
May 12 by CSHub.com Editorial StaffDiscover the main regulations financial services organizations need to comply with and tips to go beyond simple compliance for powerful cyber security
Unify third-party risk and cyber security for sustainable resiliency
April 14 by CSHub.com Editorial StaffHow to unify third-party risk and cyber security to share security goals and increase efficiency and resiliency throughout the organization
How to transform cloud security challenges into business opportunities
March 16 by CSHub.com Editorial StaffTo secure enterprise assets in the cloud, CISOs must address new challenges
How to build customer trust in cyber security
March 14 by CSHub.com Editorial StaffThe key steps for building and maintaining customer trust
OT/IoT security report: a deep look into the ICS threat landscape
January 30 by Cyber Security Hub EditorAn analysis of intrusion alerts between July-December 2022 to reveal the top threat vectors, most common malware used by bad actors and the most-targeted industries
Privileged Access Management for dummies
December 20 by CSHub.com Editorial StaffA guide to privileged access management and password security