![whitepaper thumb - image 1](../imagesrd/whitepapernew/Active-Directory-and-Windows-Infrastructure-as-a-Malware-Tool.jpg)
Active Directory and Windows Infrastructure as a Malware Tool
Read more...![whitepaper thumb - image 2](../imagesrd/whitepapernew/10bestpractice-thumb.jpg)
10 Best Practices for Keeping Active Directory Secure
Read more...![whitepaper thumb - image 3](../imagesrd/whitepapernew/whiteps1.jpg)
Avoiding privilege abuse in Active Directory
Read more...![whitepaper thumb - image 4](../imagesrd/whitepapernew/adsecurethumb.jpg)
Basic Principles for Securing Active Directory
Read more...![whitepaper thumb - image 5](../imagesrd/whitepapernew/tracking-ad-tracking.jpg)
Taking Active Directory auditing to the next level
Read more...![whitepaper thumb - image 6](../imagesrd/whitepapernew/whiteps2.jpg)
9 Critical Flaws in Auditing Active Directory Natively
Read more...![whitepaper thumb - image 7](../imagesrd/whitepapernew/why-the-ciso-needs-to-take-a-data-centric-view-on-security.jpg)
Why the CISO Needs to Take a Data-Centric View on Security
Read more...![whitepaper thumb - image 8](../imagesrd/whitepapernew/building-a-business-case-for-information-security-wtp-thumb.jpg)
Building a Business Case for Information Security
Read more...![whitepaper thumb - image 9](../imagesrd/whitepapernew/C-Suites-Greatest-Security-Risk-thumb.jpg)
Why Visibility is the C-Suite’s Greatest Security Risk
Read more...![whitepaper thumb - image 10](../imagesrd/whitepapernew/cisos-cybersecurity-strategy-thumb.jpg)
How CISOs Can Win Over the Board on Cybersecurity Strategy
Read more...![whitepaper thumb - image 11](../imagesrd/whitepapernew/US-Data-Privacy-thumb.jpg)
The New US Data Privacy Environment
Read more...![whitepaper thumb - image 12](../imagesrd/whitepapernew/GLBA-Safeguards-Rule-wp-thumb.jpg)
A Four-Step Roadmap to Complying with The GLBA Safeguards Rule
Read more...![whitepaper thumb - image 13](../imagesrd/whitepapernew/Four-Secrets-of-US-HIPAA-Compliance-thumb.jpg)
Four Secrets of US HIPAA Compliance
Read more...![whitepaper thumb - image 14](../imagesrd/whitepapernew/GLBA-Safeguards-wp.jpg)
The New GLBA Safeguards Rule and the Future of US Financial Industry Data Security
Read more...![whitepaper thumb - image 15](../imagesrd/whitepapernew/pci-dss-compliant-thumb.jpg)
How Lepide helps organizations remain PCI DSS compliant
Read more...![whitepaper thumb - image 16](../imagesrd/whitepapernew/executives-guide-to-the-business-of-malware.jpg)
Executive’s Guide to the Business of Malware
Read more...![whitepaper thumb - image 17](../imagesrd/whitepapernew/popularcyberattackthumb.jpg)
Popular Cyber Attack Methods and How to Mitigate Them
Read more...![whitepaper thumb - image 18](../imagesrd/whitepapernew/10thingsprevcyberattack-thumb.jpg)
10 Things IT Departments Do to Prevent Cyber Attacks and Meet Compliance
Read more...![whitepaper thumb - image 19](../imagesrd/whitepapernew/prepared-for-cattack-thumb.jpg)
Is Your Organization Prepared for a Cyber-Attack?
Read more...![whitepaper thumb - image 20](../imagesrd/whitepapernew/detectransomewarethumb.jpg)
Detect Ransomware using File Server Auditing
Read more...![whitepaper thumb - image 21](../imagesrd/whitepapernew/piithumb.jpg)
How to Secure and Protect Personally Identifiable Information (PII)
Read more...![whitepaper thumb - image 22](../imagesrd/whitepapernew/dcapwprthumb.jpg)
Do You Need A Data-Centric Audit and Protection Solution
Read more...![whitepaper thumb - image 23](../imagesrd/whitepapernew/Executive-Guide-to-Essential-Penetration-wp.jpg)
Executive's Guide to Essential Penetration Testing Techniques
Read more...![whitepaper thumb - image 24](../imagesrd/whitepapernew/securitymonitorthumb.jpg)
Security Monitoring: The Missing Link
Read more...![whitepaper thumb - image 25](../imagesrd/whitepapernew/insider-threat-of-malicious-cyber-rthumb.jpg)
How to Deal with the Threat of Malicious “Cyber” Insiders
Read more...![whitepaper thumb - image 26](../imagesrd/whitepapernew/whiteps3.jpg)
Insider Threats: Trust Isn’t a Security Strategy
Read more...![whitepaper thumb - image 27](../imagesrd/whitepapernew/siem-lessr-thumb.jpg)
SIEM-less Auditing with Windows
Read more...![whitepaper thumb - image 28](../imagesrd/whitepapernew/logging-auditing-and-alerting-thumb.jpg)
Auditing, Logging and Alerting
Read more...![whitepaper thumb - image 29](../imagesrd/whitepapernew/Identifying-and-Protecting-PHI-Within-Legacy-Healthcare-Systems-thumb.jpg)
Identifying and Protecting PHI Within Legacy Healthcare Systems
Read more...![whitepaper thumb - image 30](../imagesrd/whitepapernew/Cybersecurity-Legal-Sector-thumb.jpg)
A Guide to Cybersecurity in the Legal Sector
Read more...![whitepaper thumb - image 310](../imagesrd/whitepapernew/nhswhitepaperthumb.jpg)
Should the NHS Outsource Information Governance?
Read more...