TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Getting the Board Onboard with Application Security

by WhiteHat SecurityOct 12, 2018

It can be a big challenge to get board members to recognize the importance of application security, especially given the components that may not be under the widely known umbrella of perimeter security. Given that the number of breaches to the application layer have increased substantially over the years, it's now become blatantly obvious that organizations need to evaluate their application security program and investments more effectively.

This needs to be everyone's

  • Whitehat Security
  • Security Management & Analytics
  • Security platforms
  • Details

2018 Report: The Evolution of the Secure Software Lifecycle

by WhiteHat SecurityOct 12, 2018

This year WhiteHat has partnered with strategic partners Coalfire and NowSecure to produce the 2018 Application Security Statistics Report. We analyzed data from over 20,000 applicants and provide the most comprehensive view of application security available today.

It has become obvious -- the successful organizations take a systemic, risk-based approach to evaluating cybersecurity vulnerabilities and addressing these pan-organizationally -- as they would address any other market-oriented

  • Whitehat Security
  • Security Management & Analytics
  • Security Monitoring
  • Details

Design Secure Software from the First Line of Code

by WhiteHat SecurityOct 12, 2018

Have you ever discovered flaws in your applications after they've been released to the public? As developers push applications out the door at increasingly faster rates, it's crucial that security vulnerabilities are discovered during the development process. Because by the time security teams uncover these flaws, costs of remediating vulnerabilities skyrocket and development teams are onto the next sprint.

Download this white paper for keen insights into:
• Why security needs to

  • Whitehat Security
  • Risk Management/Security
  • Security Monitoring
  • Details

Securing your Code for GDPR Compliance

by WhiteHat SecurityOct 12, 2018

Writing code for compliance standards is still a young discipline; while PCI DSS has provided directives for applications security testing and check, GDPR has been less specific with its directive that new portals, websites, and applications which touch EU Citizen data be developed according to the principles of Privacy by Design.

What does that mean to the Application and Solution Architect? It means they need to figure out how to secure all future releases of applications, both web and

  • Whitehat Security
  • Security Monitoring
  • Risk Management/Security
  • Details

Cybersecurity for Small- to Medium-Sized Businesses: 10 Steps to Success

by KnowBe4, Inc.Oct 11, 2018

Small and medium-sized businesses (SMBs) are learning the hard way that they are indeed prime targets for cyber attackers. But many enterprise security tools and practices don?t work for SMBs, which have neither the budget nor the skills to operate their own IT security department. In this Dark Reading webinar, a top expert offers some tips and recommendations for securing the smaller enterprise, and for implementing simple, affordable tools and best practices that make sense for the


SIP Trunking Enables Global Scale—Rapidly and Cost-Effectively

by VoxboneOct 10, 2018

Businesses are growing across international borders quicker than ever, thanks to the rise of apps and the mobile ecosystem. But while they can quickly start selling in new markets, scaling operations to follow suit can be a harder, longer process. This webinar focuses on one business function, telephony, identifying the challenges faced by businesses that wish to rapidly create a local presence in new markets.

  • SIP Trunks
  • SIP
  • VOIP
  • VOIP software
  • VOIP services
  • Details

2018 Gartner Report: Market Guide for Managed Detection and Response Services (MDR)

by Digital GuardianOct 10, 2018

Learn about the importance of managed detection and response (MDR) in your security environment with this Gartner report.

  • Digital Guardian
  • Security Monitoring
  • Security Management & Analytics
  • Details

The Incident Responder's Field Guide

by Digital GuardianOct 10, 2018

Learn the latest tips, tricks, and recipes for fast and accurate threat hunting in our free eBook.

  • Digital Guardian
  • Security Monitoring
  • Security Management & Analytics
  • Details

Stopping Cyber Threats: Your Field Guide to Threat Hunting

by Digital GuardianOct 10, 2018

This e-book will help you create an Incident Response plan with formal guidelines for responding to attacks.

  • Digital Guardian
  • Cybersecurity
  • Security Monitoring
  • Details

Digital Guardian Technical Overview

by Digital GuardianOct 10, 2018

Learn how our platform secures your organization's sensitive data from both insider threats and external adversaries.

  • Digital Guardian
  • Security platforms
  • Security Monitoring
  • Details