Skip to navigation
Skip to main content
Skip to footer
Fox-IT Logo
Menu
Our Services
Open sub menu for Our Services
Assessment & Advisory
Assessment & Advisory
Risk Management
Supply Chain Risk
Cloud & Infrastructure
Application & Software
Mobile
Managed Vulnerability Scanning Services (MVSS)
Hardware & Embedded Systems
Cyber Security Assessment
Detection & Response
Detection & Response
Managed Detection and Response
Managed XDR for Microsoft
Incident Response
Threat Intelligence
Compliance
Compliance
Data Privacy
Government & Regulations
Payment Security
Academy
Academy
Awareness Programs
Exercises & Demonstrations
Training Programs
Software Resilience
Software Resilience
Software Escrow Agreements
Software Escrow Verification
Cloud Software Escrow Agreements
Fox Crypto
Fox Crypto
Secure Communication
Secure Data Storage
Fox DataDiode
Remediation
Remediation
Remediate
Bug Bounty
Your Sectors
Open sub menu for Your Sectors
Finance and Professional Services
Technology, Media and Telecommunications
Transport and Manufacturing
Public
Retail
Energy and Utilities
Academy
Academy
About Us
Open sub menu for About Us
Who we are
Our Office Locations
Sustainability
Investor Relations
Careers
Resources
Resources
Resource Center
Tech Blog
Newsroom
Global Cyber Policy Radar
Search
BE
Open sub menu for regions
United States
United Kingdom
Singapore
Australia
Netherlands
English
Belgium
English
Spain
Client login
Open sub menu for Customer Portals
Fox-IT ClientPortal
Managed Services Portal
Escrow View
Enter a search term
Resource Hub
Toggle filters
Filter content
Whitepapers (12)
Topic
Artificial Intelligence (1)
General Consulting (2)
Assessments (3)
Cloud Security (1)
Managed Detection & Response (MDR) (3)
Regulations & Legislation (2)
Supply Chain Management (1)
Third-Party Risk Management (1)
Sector
Public Sector & Government Services (1)
Retail & Consumer Markets (1)
Apply filters
Reset filters
Whitepapers
Cyber trends and predictions 2025
03 Feb 2025
Whitepapers
Strategic Guidance for Cyber Policy in the Wake of Political Change 2024
08 May 2024
Whitepapers
The Hidden Opponent: Cyber Threats in Sport
By
NCC Group
01 Dec 2023
Whitepapers
Safety, Security, Privacy & Prompts: Cyber Resilience in the Age of Artificial Intelligence
By
NCC Group
27 Sep 2023
Whitepapers
Cloud Security: Unlock the Benefits of the Cloud
22 Sep 2023
Whitepapers
Physical Security: The Most Overlooked Component of Your Security Program
By
NCC Group
02 Jun 2023
Whitepapers
Third-Party Risk Management: 5 Characteristics of an Inefficient Program
By
Chris Gida
07 Mar 2023
Whitepapers
Introducing the Software Security Framework (SSF)
By
Adam Perella
07 Mar 2023
Whitepapers
MDR Series Part 2: Why Endpoint Detection and Response (EDR) Isn't Enough
By
John Hollner
07 Mar 2023
Whitepapers
MDR Series Part 3: Is Your MSSP Providing True MDR Capabilities?
By
John Hollner
07 Mar 2023
Show more