TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Discover Hidden Credentials and Harden Your Network

by Illusive NetworksMay 16, 2018

Normal data-sharing and application use causes can create an attacker-friendly environment. Learn how you can improve cyber hygiene to reduce risks associated with targeted attacks.

  • Illusive Networks
  • Security
  • Network & Perimeter Security
  • Details

Ironclad APIs: An Approach for Application Security Testing

by WhiteHat SecurityMay 15, 2018

If you're not testing your APIs, you're making a big mistake. APIs are fast becoming the standard base for software development. Yet testing is often overlooked even though API code is extremely vulnerable to even the simplest of attacks. Download this whitepaper for:
• A brief overview of APIs
• Common API security vulnerabilities
• Best practices for properly testing your mission-critical APIs

  • Whitehat Security
  • Security Monitoring
  • Security Management & Analytics
  • Details

Getting the Board Onboard with Application Security

by WhiteHat SecurityMay 15, 2018

A WhiteHat Security Best Practices Guide

Download this paper to learn how to:
• Educate your board of directors about cybersecurity and get buy-in
• Incorporate AppSec into network security practices
• Make AppSec visible to executives, and across your security and development organizations
• Shift to DevSecOps: Support security AND development

  • Whitehat Security
  • Security Management & Analytics
  • Security platforms
  • Details

Five Days to Setting Up an Application Security Program

by WhiteHat SecurityMay 15, 2018

An AppSec program is intended to implement security measures throughout the SDLC. This guide is a short, straightforward introduction to setting up or improving your Application Security Program.

  • Whitehat Security
  • Security Management & Analytics
  • Security platforms
  • Details

The Essential Guide to Security

by SplunkMay 15, 2018

See how organizations can use machine data to solve specific security use cases. Get started addressing threats and security challenges today.

  • Splunk
  • Security Monitoring
  • Endpoint Security
  • Details

A Guide to Fraud in the Real World

by SplunkMay 15, 2018

Fraud is a growing problem as more parts of our lives are being touched by digitization. Learn how organizations are using machine data to find anomalies to fight fraud.

  • Splunk
  • Security Monitoring
  • Endpoint Security
  • Details

2018 Cisco Annual Cybersecurity Report

by Cisco UmbrellaMay 11, 2018

For years, Cisco has been warning defenders about escalating cybercriminal activity around the globe. In this, our 2018 Annual Cybersecurity Report, we present data and analysis from Cisco threat researchers and several of our technology partners about attacker behavior observed over the past 12 to 18 months.
Report Includes:
• The evolution of malware, including the developments behind network-based ransomware
• Tactics adversaries are using to evade detection, namely,

  • Cisco Umbrella
  • Cybersecurity
  • Security Monitoring
  • Details

Simple, effective security for your network transformation

by Cisco UmbrellaMay 11, 2018

As a secure internet gateway, Cisco Umbrella helps you tackle the challenges of mobility, SaaS, and branch transformation by offering a single platform that secures access to and use of the cloud, SaaS applications, branch offices, and endpoints.

It's your first line of defense against threats -- anytime and anywhere your users access the internet, traffic goes through Umbrella first.

To understand how a secure internet gateway provides 360-degree security for access to and

  • Cisco Umbrella
  • Cybersecurity
  • Security Monitoring
  • Details

Take your security to new heights: The Cloud

by Cisco UmbrellaMay 11, 2018

The cloud — at one point it was a revolution in the workplace. Now it is simply accepted as an efficient way to get business done. The increase in mobile devices and cloud applications has changed everything, from where we work, to how we communicate, collaborate, and store information. Has your security kept pace with this change?

Most of today's IT security was built to protect a well-defined network infrastructure, but that is yesterday's architecture. When users and assets

  • Cisco Umbrella
  • Security Monitoring
  • Network & Perimeter Security
  • Details

What attacks aren’t you seeing?

by Cisco UmbrellaMay 11, 2018

We work everywhere: at home, in the office, airports, coffee shops yet traditional security solutions still focus on protecting employees only while on the corporate network. This eBook will educate IT pros about the risks of only relying on legacy defenses like firewalls, web gateways and sandboxes for network security. What if you could leverage a secret weapon that you already have in your security stack to see attacks and protect roaming users, from any device? We'll describe how Cisco

  • Cisco Umbrella
  • Security Monitoring
  • Cybersecurity
  • Details