SecureState is constantly researching topics relevant to information security.
List of White Papers
The Best Insider Tips for Passing InfoSec Certifications
A beginner's guide to what they are and how to ace them.
Using ROI to Justify Cyber Security Investments
The best way to get Executive attention is to provide a “Quantifiable” Security (ROI) for any new projects.
2015 Attack Vectors Report
A break down of common attack vectors as well as new methods and vectors seen this year.
Effective Vendor Management
A guide to building a successful vendor management program.
2014 Attack Vectors Report
An analysis of attack vector data collected during the hundreds of penetration tests we perform.
An analysis of select client security spending habits, breaking spending into several categories.
The Hands-Off Approach: Using Cisco's VMDC to Reduce Pain While Achieving FISMA Compliance
An analysis of how Cisco’s VMDC can help reduce overhead costs of the FISMA compliance.
The Problem With Privacy: How Social Media Can Be Used Against You
For all of its benefits, social media is not without dangers.
SecureState's iRisk equation is a simple method for assessing organizational security risk.
Incident Response Testing and How it Applies to You
An analysis on using incident response testing to validate your ability to respond to an attack.
Physical Access Controls: the MIFARE Classic Exploit
An analysis of the weaknesses of the MIFARE smart card technology and how they can be exploited.
Accounting Systems Fraud in the Digital Age
An analysis of Project Mayhem, a proof of concept tool making account fraud easy and undetectable.