TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Hacker-Powered Pen Tests and the Power of More

by HackerOneJul 07, 2018

Traditional Pen Tests are no longer satisfactory. That's why more and more security teams are turning to Hacker-Powered Pen Tests. As a result, they tap into top talent, and get high-quality reports.

  • HackerOne
  • Security
  • Security Monitoring
  • Details

The Pictet Group’s Security in a Digital World - Bounties for Bug Hunters Make The Internet Safer

by HackerOneJul 06, 2018

HackerOne's network of more than 100.000 ethical hackers can help online organisations eradicate vulnerabilities in their internet systems that could be exploited by criminals, says Marten Mickos, its chief Executive Officer

  • HackerOne
  • Security
  • Security Monitoring
  • Details

Vulnerability Disclosure Policy (VDP) Basics

by HackerOneJul 06, 2018

There's no hiding from it. If your software or product has an attack surface, a vulnerability will be found by a hacker, security researcher, internal engineer, or random user. Because no system can be entirely free of security issues, it's crucial to provide a clear way for anyone to report vulnerabilities.

  • HackerOne
  • Security
  • Security Monitoring
  • Details

How GM Works with Hackers to Enhance Their Security

by HackerOneJul 06, 2018

Jeff Massimilla, Vice President Global Cybersecurity, General Motors and team have been operating their public vulnerability disclosure program with HackerOne for over 2 years. They have such success with their HackerOne Response VDP.

  • HackerOne
  • Security
  • Security Monitoring
  • Details

Distributed Defense: How Government Agencies Deploy Hacker-Powered Security

by HackerOneJul 06, 2018

The U.S. Department of Defense runs an ongoing Vulnerability Disclosure Program through HackerOne Response. This case study shows how government organizations like EU Commission, Singapore MINDEF, The Pentagon, and more reap benefits of hacker-powered security.

  • HackerOne
  • Security
  • Security Monitoring
  • Details

Cyber Threat Brief: The 2018 FIFA World Cup

by AnomaliJul 03, 2018

Physical and cyber threats have become ubiquitous at large sporting events.

Given its popularity and global affiliation, the 2018 FIFA World Cup is exactly the kind of event that could attract hooliganism, terrorism, cybercrime and other security threats. This report explains the main physical and cyber concerns to watch for at the 2018 FIFA World Cup coupled with expert analysis of each threat's severity and likelihood.

Whether you're in Russia for the games or watching from your

  • Anomali
  • Cybersecurity
  • Security Monitoring
  • Details

Cyber Threat Landscape: The Healthcare Industry

by AnomaliJul 03, 2018

Healthcare organizations have made the news in recent years after becoming victims of cyber attacks.

Unique aspects present in the healthcare industry make it a valuable target to cybercriminals and nation-states alike. Understanding the nature of the threats to the healthcare industry helps define effective ways to counter these threats and help to prevent them from making future headlines.

The Anomali Threat Landscape Report on the Healthcare Industry covers the following

  • Anomali
  • Cybersecurity
  • Security Monitoring
  • Details

Active Archive and Data Repository: Building the Data Warehouse of the Future

by Dell EMC / Intel®Jun 29, 2018

Many enterprises begin their journey toward the data warehouse of the future by offloading their ETL processes into Hadoop, resulting in significant cost savings. Once they have a Hadoop cluster up and running, the next logical steps are to expand their use of Hadoop by first creating an active archive and then a data repository.

Most organizations have structured data they rarely access, but do not want to delete. Moving this cold data into Hadoop for active archive keeps the data

  • Dell EMC / Intel®
  • Software Platforms
  • Big Data
  • Details

Will Virtual Agents Improve Your Support Model?

by ServiceaideJun 28, 2018

Artificial intelligence has been explored for decades and it is now a normal part of our daily lives. It only makes sense to rethink traditional IT service delivery and enhance the customer experience with real-time, intelligent support using a virtual assistant.

  • Serviceaide
  • Infrastructure
  • Networking
  • Details

Understanding the Difference between an Asset and a Configuration Item

by ServiceaideJun 28, 2018

The technology industry is full of buzzwords and acronyms that constantly change based on new innovations and current trends. Two important terms that all IT professionals should understand are 'asset' and 'CI.' The difference between these two essential IT concepts is one of the most frequently asked ITSM questions.

  • Serviceaide
  • Infrastructure
  • Networking
  • Details