Fox-IT Logo
Menu
Your Challenges
Open sub menu for Your Challenges
How secure is our business?
How do we comply with regulations?
How do we protect critical assets?
How do we improve our cyber resilience?
Are we prepared for an incident?
How do we manage supply chain risk?
How do we manage cloud cyber security & resilience?
Our Solutions
Open sub menu for Our Solutions
Assessment & Advisory
Risk Management
Supply Chain Risk
Cloud & Infrastructure
Application & Software
Mobile
Managed Vulnerability Scanning Services (MVSS)
Hardware & Embedded Systems
Calibrate
Cyber Security Assessment
Detection & Response
Managed XDR for Microsoft
Managed Detection and Response
Incident Response
Threat Intelligence
Compliance
Data Privacy
Government & Regulations
Payment Security
Academy
Awareness Programs
Exercises & Demonstrations
Training Programs
Escode
Software Escrow
SaaS Escrow
Escrow Agreements
Escrow Verifications
Fox Crypto
Media and file encryption
Network security
Fox DataDiode
Secure mobile communication
Encryption Key Management
Remediation
Remediate
Bug Bounty
Your Sectors
Open sub menu for Your Sectors
Finance and Professional Services
Technology, Media and Telecommunications
Transport and Manufacturing
Public
Retail
Energy and Utilities
Resources
Open sub menu for Resources
Resource Hub
Global Cyber Policy Radar
Academy
About Us
Open sub menu for About Us
Who we are
Our Office Locations
Sustainability
Investor Relations
Careers
Resources
Resource Center
Tech Blog
Newsroom
Russia/Ukraine Threat Intelligence
Search
NL
Open sub menu for regions
United States
United Kingdom
Singapore
Australia
Netherlands
English
Belgium
English
Spain
Client login
Open sub menu for Customer Portals
Fox-IT ClientPortal
Managed Services Portal
Signify IMC Portal
Escrow View
​
Resource Center
Toggle filters
Filter content
Whitepapers (11)
Topic
Artificial Intelligence (1)
General Consulting (2)
Assessments (3)
Cloud Security (1)
Managed Detection & Response (MDR) (3)
Regulations & Legislation (2)
Supply Chain Management (1)
Third-Party Risk Management (1)
Sector
Public Sector & Government Services (1)
Retail & Consumer Markets (1)
Apply filters
Reset filters
Whitepapers
Strategic Guidance for Cyber Policy in the Wake of Political Change 2024
08 May 2024
Whitepapers
The Hidden Opponent: Cyber Threats in Sport
By
NCC Group
01 Dec 2023
Whitepapers
Safety, Security, Privacy & Prompts: Cyber Resilience in the Age of Artificial Intelligence
By
NCC Group
27 Sep 2023
Whitepapers
Cloud Security: Unlock the Benefits of the Cloud
22 Sep 2023
Whitepapers
Physical Security: The Most Overlooked Component of Your Security Program
By
NCC Group
02 Jun 2023
Whitepapers
Third-Party Risk Management: 5 Characteristics of an Inefficient Program
By
Chris Gida
07 Mar 2023
Whitepapers
Introducing the Software Security Framework (SSF)
By
Adam Perella
07 Mar 2023
Whitepapers
MDR Series Part 2: Why Endpoint Detection and Response (EDR) Isn't Enough
By
John Hollner
07 Mar 2023
Whitepapers
MDR Series Part 3: Is Your MSSP Providing True MDR Capabilities?
By
John Hollner
07 Mar 2023
Whitepapers
MDR Series Part 1: Demystifying the buzzwords
By
John Hollner
07 Mar 2023
Show more