A series of informative whitepapers covering a range of issues, including cyber-security, ransomware, IT auditing and much more

Latest Whitepapers

whitepaper thumb - Data Access Governance

The Complete Guide to Effective Data Access Governance.

Read more...
whitepaper thumb - zero trust

The Complete Guide to Zero Trust for Government Bodies.

Read more...
whitepaper thumb - zero trust

The Complete Guide to Zero Trust for Educational Bodies.

Read more...
whitepaper thumb - cjis

The Complete Guide to CJIS Compliance for Government Bodies.

Read more...
whitepaper thumb - image 1

Active Directory and Windows Infrastructure as a Malware Tool

Read more...
whitepaper thumb - image 2

10 Best Practices for Keeping Active Directory Secure

Read more...
whitepaper thumb - image 3

Avoiding privilege abuse in Active Directory

Read more...
whitepaper thumb - image 4

Basic Principles for Securing Active Directory

Read more...
whitepaper thumb - image 5

Taking Active Directory auditing to the next level

Read more...
whitepaper thumb - image 6

9 Critical Flaws in Auditing Active Directory Natively

Read more...
whitepaper thumb - image 7

Why the CISO Needs to Take a Data-Centric View on Security

Read more...
whitepaper thumb - image 8

Building a Business Case for Information Security

Read more...
whitepaper thumb - image 9

Why Visibility is the C-Suite’s Greatest Security Risk

Read more...
whitepaper thumb - image 10

How CISOs Can Win Over the Board on Cybersecurity Strategy

Read more...
whitepaper thumb - cjis

The complete guide to CJIS compliance for government bodies.

Read more...
whitepaper thumb - image 11

The New US Data Privacy Environment

Read more...
whitepaper thumb - image 12

A Four-Step Roadmap to Complying with The GLBA Safeguards Rule

Read more...
whitepaper thumb - image 13

Four Secrets of US HIPAA Compliance

Read more...
whitepaper thumb - image 14

The New GLBA Safeguards Rule and the Future of US Financial Industry Data Security

Read more...
whitepaper thumb - image 15

How Lepide helps organizations remain PCI DSS compliant

Read more...
whitepaper thumb - image 16

Executive’s Guide to the Business of Malware

Read more...
whitepaper thumb - image 17

Popular Cyber Attack Methods and How to Mitigate Them

Read more...
whitepaper thumb - image 18

10 Things IT Departments Do to Prevent Cyber Attacks and Meet Compliance

Read more...
whitepaper thumb - image 19

Is Your Organization Prepared for a Cyber-Attack?

Read more...
whitepaper thumb - image 20

Detect Ransomware using File Server Auditing

Read more...
whitepaper thumb - AI

Generative AI Security Risks and how to Overcome Them

Read more...
whitepaper thumb - copilot

Lepide Guide for Microsoft 365 Copilot

Read more...
whitepaper thumb - image 21

How to Secure and Protect Personally Identifiable Information (PII)

Read more...
whitepaper thumb - image 22

Do You Need A Data-Centric Audit and Protection Solution

Read more...
whitepaper thumb - image 23

Executive's Guide to Essential Penetration Testing Techniques

Read more...
whitepaper thumb - image 24

Security Monitoring: The Missing Link

Read more...
whitepaper thumb - image 25

How to Deal with the Threat of Malicious “Cyber” Insiders

Read more...
whitepaper thumb - image 26

Insider Threats: Trust Isn’t a Security Strategy

Read more...
whitepaper thumb - image 27

SIEM-less Auditing with Windows

Read more...
whitepaper thumb - image 28

Auditing, Logging and Alerting

Read more...
whitepaper thumb - image 29

Identifying and Protecting PHI Within Legacy Healthcare Systems

Read more...
whitepaper thumb - image 30

A Guide to Cybersecurity in the Legal Sector

Read more...
whitepaper thumb - image 310

Should the NHS Outsource Information Governance?

Read more...