A series of informative whitepapers covering a range of issues, including cyber-security, ransomware, IT auditing and much more

Active Directory and Windows Infrastructure as a Malware Tool

Read more

10 Best Practices for Keeping Active Directory Secure

Read more

Avoiding privilege abuse in Active Directory

Read more

Basic Principles for Securing Active Directory

Read more

Taking Active Directory auditing to the next level

Read more

9 Critical Flaws in Auditing Active Directory Natively

Read more

Why the CISO Needs to Take a Data-Centric View on Security

Read more

Building a Business Case for Information Security

Read more

Why Visibility is the C-Suite’s Greatest Security Risk

Read more

How CISOs Can Win Over the Board on Cybersecurity Strategy

Read more

The New US Data Privacy Environment

Read more

A Four-Step Roadmap to Complying with The GLBA Safeguards Rule

Read more

Four Secrets of US HIPAA Compliance

Read more

The New GLBA Safeguards Rule and the Future of US Financial Industry Data Security

Read more

How Lepide helps organizations remain PCI DSS compliant

Read more

Executive’s Guide to the Business of Malware

Read more

Popular Cyber Attack Methods and How to Mitigate Them

Read more

10 Things IT Departments Do to Prevent Cyber Attacks and Meet Compliance

Read more

Is Your Organization Prepared for a Cyber-Attack?

Read more

Detect Ransomware using File Server Auditing

Read more

How to Secure and Protect Personally Identifiable Information (PII)

Read more

Do You Need A Data-Centric Audit and Protection Solution

Read more

Executive's Guide to Essential Penetration Testing Techniques

Read more

Security Monitoring: The Missing Link

Read more

How to Deal with the Threat of Malicious “Cyber” Insiders

Read more

Insider Threats: Trust Isn’t a Security Strategy

Read more

SIEM-less Auditing with Windows

Read more

Auditing, Logging and Alerting

Read more

Identifying and Protecting PHI Within Legacy Healthcare Systems

Read more

A Guide to Cybersecurity in the Legal Sector

Read more

Should the NHS Outsource Information Governance?

Read more