Latest Whitepapers
The Complete Guide to Effective Data Access Governance.
Read more...The Complete Guide to Zero Trust for Government Bodies.
Read more...The Complete Guide to Zero Trust for Educational Bodies.
Read more...The Complete Guide to CJIS Compliance for Government Bodies.
Read more...Active Directory and Windows Infrastructure as a Malware Tool
Read more...10 Best Practices for Keeping Active Directory Secure
Read more...Avoiding privilege abuse in Active Directory
Read more...Basic Principles for Securing Active Directory
Read more...Taking Active Directory auditing to the next level
Read more...9 Critical Flaws in Auditing Active Directory Natively
Read more...Why the CISO Needs to Take a Data-Centric View on Security
Read more...Building a Business Case for Information Security
Read more...Why Visibility is the C-Suite’s Greatest Security Risk
Read more...How CISOs Can Win Over the Board on Cybersecurity Strategy
Read more...The complete guide to CJIS compliance for government bodies.
Read more...The New US Data Privacy Environment
Read more...A Four-Step Roadmap to Complying with The GLBA Safeguards Rule
Read more...Four Secrets of US HIPAA Compliance
Read more...The New GLBA Safeguards Rule and the Future of US Financial Industry Data Security
Read more...How Lepide helps organizations remain PCI DSS compliant
Read more...Executive’s Guide to the Business of Malware
Read more...Popular Cyber Attack Methods and How to Mitigate Them
Read more...10 Things IT Departments Do to Prevent Cyber Attacks and Meet Compliance
Read more...Is Your Organization Prepared for a Cyber-Attack?
Read more...Detect Ransomware using File Server Auditing
Read more...Generative AI Security Risks and how to Overcome Them
Read more...Lepide Guide for Microsoft 365 Copilot
Read more...How to Secure and Protect Personally Identifiable Information (PII)
Read more...Do You Need A Data-Centric Audit and Protection Solution
Read more...Executive's Guide to Essential Penetration Testing Techniques
Read more...Security Monitoring: The Missing Link
Read more...How to Deal with the Threat of Malicious “Cyber” Insiders
Read more...Insider Threats: Trust Isn’t a Security Strategy
Read more...SIEM-less Auditing with Windows
Read more...Auditing, Logging and Alerting
Read more...Identifying and Protecting PHI Within Legacy Healthcare Systems
Read more...A Guide to Cybersecurity in the Legal Sector
Read more...Should the NHS Outsource Information Governance?
Read more...