CISO White Papers

(View All Report Types)
Five Things Your IT Resources Should Be Telling You - And Aren't
sponsored by Unisys
WHITE PAPER: This whitepaper describes the types of information IT managers should expect to gain from leading-edge IT resource governance tools.
Posted: 22 Jan 2009 | Published: 22 Jan 2009

Unisys

Symantec Backup Exec Quick Recovery and Off-Host Backup Solutions for Microsoft Exchange Server 2003 and Microsoft SQL Server
sponsored by Veritas
WHITE PAPER: Learn about a comprehensive technology for customers that want quick recovery and off-host backup support. Eliminate backup windows, reduce the performance load on application servers, and quickly bring applications back online after data c...
Posted: 19 Nov 2007 | Published: 01 Mar 2007

Veritas

CISO Perspectives for 2025
sponsored by Portnox
RESEARCH CONTENT: CISOs are concerned about security breaches and their job security, as they balance security with employee experience. Many are implementing Passwordless Authentication to improve access control, but face challenges like employee resistance. Download the full report to explore CISO perspectives on Zero Trust, MFA, regulations, and cyber insurance.
Posted: 08 Feb 2025 | Published: 08 Feb 2025

Portnox

The CISO Survival Guide
sponsored by ReversingLabs
EBOOK: The rise of software supply chain attacks targeting third-party software providers and rising regulatory pressure has spurred cybersecurity and risk leaders to pay special attention to commercial software and the gaps it presents across the software supply chain. Read this 18-page guide for risk management guidance.
Posted: 23 Jan 2025 | Published: 24 Jan 2025

ReversingLabs

CISO Report Emerging trends
sponsored by Splunk
EBOOK: CISOs and their boards are working more closely than ever. But their backgrounds are worlds apart, leading to gaps in priorities, goals, and success metrics. Learn how CISOs and boards can bridge the divide and build stronger, more productive relationships.
Posted: 20 Feb 2025 | Published: 20 Feb 2025

Splunk

The Industrial CISO: Bringing Balance
sponsored by Netskope
EBOOK: This report explores the evolving role of CISOs in the industrial sector, revealing their growing confidence as business enablers despite perception challenges from C-suite peers. It examines the adoption of zero trust principles and the need for CISOs to focus on business enablement over technology. Read the full eBook for deeper insights.
Posted: 27 Feb 2025 | Published: 28 Feb 2025

Netskope

The CISO Playbook for Cloud Security
sponsored by Fortinet, Inc.
EBOOK: This playbook advises CISOs to strengthen their influence, create teamwork, and dispel the perception of security as a cost center. Read on now to learn how your business can leverage Fortinet to help you achieve those goals.
Posted: 18 Dec 2024 | Published: 18 Dec 2024

Fortinet, Inc.

The CISO Guide to Ransomware Prevention
sponsored by Checkpoint Software Technologies
WHITE PAPER: Over the last 5 years, ransomware attacks have increased by 13%, with the average cost exceeding $1.8 million per incident. This white paper presents a CISO’s guide to ransomware prevention, including insights from Check Point VP Security Engineering, Jeff Schwartz. Read on to learn more.
Posted: 10 May 2024 | Published: 10 May 2024

TOPICS:  .NET
Checkpoint Software Technologies

A CISO's Guide to AI in 2024
sponsored by Checkpoint Software Technologies
EBOOK: While generative AI has garnered much attention, it only represents a fragment of the rapidly evolving AI landscape. Security teams have recognized the potential AI has to transform cybersecurity, highlighted by the 92% of organizations that intend to use AI and machine learning to support cyber security. Download this e-book to learn more.
Posted: 15 May 2024 | Published: 15 May 2024

TOPICS:  .NET
Checkpoint Software Technologies

The CISO's guide to supply chain security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Supply chain attacks have long been a concern in cyber security circles as it can be difficult to enforce security measures for suppliers and partners. In this e-guide, find out why supply chain attacks are intensifying amid the pandemic, how companies are responding to the attacks and what else organisations can do to disrupt the cyber kill chain.
Posted: 04 Jul 2021 | Published: 05 Jul 2021

TechTarget ComputerWeekly.com

From The Trenches: A CISO's Guide To Threat Intelligence
sponsored by Zscaler
BLOG: Threat intelligence gives CISOs critical insights to proactively defend against evolving cyber threats. This guide explores how to build an effective threat intelligence program, leverage standardized sharing formats, and transform security from reactive to proactive. Read the full article to learn more.
Posted: 13 Aug 2024 | Published: 13 Aug 2024

Zscaler

The Ciso’s Guide To The Roi Of Cybersecurity
sponsored by Arkose Labs
EBOOK: Facing increased scrutiny and cyberthreats, CISOs can explore 5 ways to show bot management ROI in this e-book. Learn to quantify savings from less downtime, breaches, reputational harm, and revenue loss. Download to justify investing in modern bot management.
Posted: 16 Jul 2024 | Published: 16 Jul 2024

Arkose Labs

CISO’s AI Journey Checklist
sponsored by CBTS
INFOGRAPHIC: This infographic provides a guide for CISOs on securely integrating AI into their organizations. It covers critical steps such as assessing AI risks, understanding data requirements, approving AI services, and fostering a culture of ethical AI use. Download the infographic to learn how to strengthen your organization's cybersecurity with AI.
Posted: 27 Jan 2025 | Published: 28 Jan 2025

CBTS

5 Security Concerns for CISOs and How to Address Them
sponsored by Palo Alto Networks
WHITE PAPER: This white paper explores 5 key security concerns for CISOs, including supply chain attacks, cloud security, and overloaded security teams. Get expert guidance on how to address these issues and prepare your organization for evolving cyberthreats. Read the full white paper to learn more.
Posted: 08 Nov 2024 | Published: 08 Nov 2024

Palo Alto Networks

Getting Cloud Security Right
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we will consider how to do cloud security right. Regular Computer Weekly contributor Peter Ray Allison explores this issue, weighing up the questions organisations should be asking of their cloud service providers, and whose responsibility cloud security should be.
Posted: 08 Feb 2021 | Published: 11 May 2020

TechTarget ComputerWeekly.com

A CISO's Guide to Cyber Security in Action (2023)
sponsored by Checkpoint Software Technologies
WHITE PAPER: Emerging threats are forcing security teams to evolve by adopting and adapting new technologies, putting tremendous pressure on CISOs. This white paper presents a guide to help CISOs navigate the challenges of today’s security landscape. Read on to learn more.
Posted: 17 May 2024 | Published: 17 May 2024

TOPICS:  .NET
Checkpoint Software Technologies

Untethered: How CIOs & CISOs Are Paving the Way for the New Hybrid Workforce
sponsored by Zscaler
RESEARCH CONTENT: This in-depth research report examines how CIOs and CISOs are overcoming the challenges of the hybrid workforce, including securing remote access and more. Download the full report to discover effective techniques for transitioning to a Zero Trust strategy.
Posted: 13 Aug 2024 | Published: 20 Aug 2024

Zscaler

A CISO’s Guide to Rethinking Insider Risk
sponsored by Exabeam
WHITE PAPER: Insider threats account for 68% of data breaches, with negligent employees causing 55% of incidents, costing $7.2 million on average. This white paper shows how CISOs should work with HR, Legal, and Security teams to detect and prevent insider risks using frameworks, strategies, and automated detection. Read for a comprehensive risk plan.
Posted: 26 Mar 2025 | Published: 26 Mar 2025

Exabeam

Fraud & Threat Prevention A Checklist for CIOs & CISOs
sponsored by Ping Identity Corporation
WHITE PAPER: This checklist for CIOs and CISOs outlines key identity and access management capabilities to prevent fraud and insider threats. It covers customer identity, workforce identity, and B2B access, offering strategies to boost security, compliance, and user satisfaction. Read this paper to assess your organization's fraud readiness and security.
Posted: 15 Mar 2025 | Published: 15 Mar 2025

Ping Identity Corporation

A CISO's Guide to the AI Opportunity in Security Operations
sponsored by Exabeam
WHITE PAPER: AI is transforming cybersecurity, impacting both attackers and defenders. This guide examines AI's role in enhancing threat detection via machine learning and the challenges it poses, like advanced phishing and polymorphic malware. Discover how to assess AI solutions for your SOC and prepare for an AI-driven security future by reading the paper.
Posted: 22 Mar 2025 | Published: 20 Mar 2025

Exabeam

A CISO’s Guide to the AI Opportunity in Security Operations
sponsored by Exabeam
WHITE PAPER: AI is transforming cybersecurity, presenting opportunities and threats for CISOs. This guide defines AI technologies impacting security, explores their role in threat detection, and outlines building AI-augmented defenses. Discover proven technologies that strengthen security. Read the white paper to prepare your SOC for an AI-driven future.
Posted: 26 Mar 2025 | Published: 26 Mar 2025

Exabeam

The Cost of Compromise: Why CISOs Should Reject 'Good Enough' Security
sponsored by Exabeam
WHITE PAPER: This white paper explains why CISOs should prioritize best-of-breed SIEM solutions over "good enough" enterprise platform security. Single-vendor approaches risk blind spots, single points of failure, and limited log ingestion—compromising security. Read to understand why specialized solutions offer superior threat detection and response.
Posted: 22 Mar 2025 | Published: 20 Mar 2025

Exabeam

A CISO’s Guide to the AI Opportunity in Security Operations
sponsored by Exabeam
WHITE PAPER: AI is transforming cybersecurity, impacting both attackers and defenders. This guide examines AI's role in enhancing threat detection via machine learning and the challenges it poses, like advanced phishing and polymorphic malware. Discover how to assess AI solutions for your SOC and prepare for an AI-driven security future by reading the paper.
Posted: 20 Mar 2025 | Published: 20 Mar 2025

Exabeam

The Healthcare CISO’s Medical IoT Security Guide
sponsored by Palo Alto Networks
EBOOK: Over the past few years, the healthcare industry has seen a surge in the use of connected medical devices. However, the more devices a healthcare organization deploys and connects, the bigger their attack surface becomes, putting confidential health data at risk. Read on to learn how to overcome the risk exposure of medical IoT devices.
Posted: 08 Nov 2023 | Published: 08 Nov 2023

TOPICS:  .NET
Palo Alto Networks

Computer Weekly - 29 November 2022: How to stop data retention from killing the planet
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, there's a hidden environmental cost to the vast volumes of data being generated – we examine what can be done to address it. We talk to the CISO of consumer reviews site Trustpilot, about building trust in IT security. And we look at what IT leaders can do if they inherit a toxic team environment. Read the issue now.
Posted: 28 Nov 2022 | Published: 29 Nov 2022

TechTarget ComputerWeekly.com

Computer Weekly - 7 April 2020: Adapting IT to the new normal
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to four top IT leaders to find out how they are supporting their organisations through the coronavirus crisis. We look at the security best practices recommended by experts to ensure safe remote working for staff. And the CISO of Equifax explains why the firm is moving to public cloud. Read the issue now.
Posted: 08 Feb 2021 | Published: 07 Apr 2020

TechTarget ComputerWeekly.com

The Transformational CISO’s Guide to Security Orchestration, Automation and Response
sponsored by Splunk
EBOOK: Download your complimentary copy of “The Transformational CISO’s Guide to Security Orchestration, Automation and Response (SOAR)” to learn the four qualities of a CISO executives value most, and how SOAR can help many of the biggest challenges facing CISOs.
Posted: 19 Aug 2022 | Published: 19 Aug 2022

TOPICS:  .NET
Splunk