White Papers

Original white papers from the TAG Cyber analysts provide in-depth information and insights into how modern enterprise CISO teams can make good decisions about the best security tools, most effective security platforms, strongest enterprise security architectures, and top commercial cyber security vendors.

Investigating Data-Centric Security Strategies

Using Self-Healing to Achieve DevSecOps

Addressing Application Vulnerabilities Without Development Resources

Take Back Control of Your Hybrid Work Environment

How to Stop Digital Impersonation from Causing Account Takeover

Achieving Cloud-Wide, Workload-Deep Security and Compliance for Public Cloud Environments

Managing SaaS Security Risks

Packet Capture is a Foundational Technology

Transforming Access and Identity to Prevent Cyber Exploit

Protecting Digital Identity from Cyber Compromise

Case Study: Securing Access Entitlements in the Cloud

Can You See the Forest Through the Trees? Active Directory Protection Against Ransomware & Data Loss

Maximizing Open Source Security Tools by Engaging an Open-core Vendor

A Guide To A Best Practice Web Application Operational Security Program

Practical Methods for Securing the Cloud

Women in Tech: Where Do We Go From Here

Advice on Security Selection for SOC Analysts and DevOps Teams

Report Rogue Device Threat to Financial Services

Simplifying the Messy World of Encryption and Key Management via APIs.

Crowdsourced Security Testing with Synack

Introducing the Human Layer Security Maturity Model

The Network at the Core of Detection and Response

Managing PC Firmware Health for Enterprise IT Cost Reduction

A Process to Implement Zero Trust Access

Requirements for Security Performance Management

Data Sharding for Back-End Cloud Security

Respond Software Launches First Responder Service

OpenText to Acquire Carbonite

Randori Announces Recon Platform Availability - 10/24/19

Identity-Based Improvement to Zero Trust

Three Generations of Automated Cyber Attacks

Evolution of the Zero Trust Model for Cyber Security

Cyber Security Framework For Autonomous Machines

The Role of Commercial End-to-End Secure Mobile Voice in Cyberspace

vArmour Technical Report

Cyberlytic Technical Report