TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

5 Ways to Transform Business Processes

by K2Nov 21, 2016

Make Your Processes Agile and Your Business Competitive

Historically, large companies have hampered process agility by locking themselves into outdated systems, processes, and ways of working, but a variety of factors - including modernization and customer expectations - are increasingly playing a role in driving companies toward business process transformation.

Based on Process Excellence Network's 5 Ways to Transform Business Processes to Optimize Agility, this white

  • Digital Business
  • Executive Insights & Innovation
  • K2
  • Details

Healthcare Ransomware: Hospitals On Hold

by Kaspersky LabNov 17, 2016

Hospital operations coming to a grinding halt. Patients being admitted by handwritten records. And a mysterious message explaining that the only way to get things back up and running is to pay a ransom. It's a scenario that is all too familiar to many hospitals around the country, and it's only getting worse as cybercriminals realize how easily they can penetrate the weak security at many hospitals.

How does a healthcare organization protect itself and keep operations running

  • Kaspersky Lab
  • Cybersecurity
  • Mobile security
  • Details

Cybercriminals: Unmasking The Villain

by Kaspersky LabNov 17, 2016

With all of the overwhelming statistics on cybercrime, it can be easy to forget that there are actual people behind these facts and figures.

Have you ever wondered who they are? What countries they come from? Who are their top targets?

As a leader in cybercrime analysis, Kaspersky Lab's GReAT (Global Research and Analysis) team has the answers to your questions in our new eBook, Cybercriminals: Unmasking the Villain, where you can find out such fascinating facts about the

  • Kaspersky Lab
  • Cybersecurity
  • Security Monitoring
  • Details

The Threats From Within

by Kaspersky LabNov 17, 2016

Your employees are your most valuable asset. But they can also be the weakest link in your security chain.

According to Kaspersky Lab research, 73% of organizations had an internal security incident in 2015. Whether accidental or intentional, employees often cause internal data breach issues that can severely compromise your business.

Download our eBook, The Threats from Withinz; How Educating Your Employees on Cybersecurity Can Protect Your Company, to access invaluable

  • Kaspersky Lab
  • Security Management & Analytics
  • Security Monitoring
  • Details

The Dangers Of Phishing: Help Employees Avoid The Lure Of Cybercrime

by Kaspersky LabNov 17, 2016

Phishing, which targets employees through fraudulent emails with the intent of getting at sensitive corporate data, is one of the biggest threats to corporate IT security. In fact, Kaspersky Lab's own research shows that in the aftermath of a phishing attack, professional services are usually required to restore normal service, leading to costly budget overruns.Phishing, which targets employees through fraudulent emails with the intent of getting at sensitive corporate data, is one of the

  • Kaspersky Lab
  • Cybersecurity
  • Security Management & Analytics
  • Details

Ransomware: All Locked Up And No Place To Go

by Kaspersky LabNov 17, 2016

News stories about ransomware are becoming a daily event. Hospitals, government agencies and individuals have all been hit by this growing menace, and the threat is only going to grow. As cybercriminals learn just how effective this method of extortion is, Kaspersky Lab experts predict that ransomware attacks will become increasingly targeted at organizations most likely to pay.

But there is hope. By learning the tactics behind ransomware, you can stop an attack from happening in the

  • Kaspersky Lab
  • Security Management & Analytics
  • Security Monitoring
  • Details

Shooting the Messenger: Understanding the Threats to the Media and Broadcasting Industry

by Digital ShadowsNov 16, 2016

Amid all of the noise, it's often tricky for organizations to identify and prioritize the threats they face online. Organizations in the media and broadcasting industry are no exception.

This paper explores:
- Trends in the threats seen in 2016 for broadcasting and media organizations
- The steps that can be taken to prevent and mitigate potential threats

  • Digital Shadows
  • Cybersecurity
  • Risk Management/Security
  • Details

Ransomware is Increasing the Risks & Impact to Organizations

by mimecastNov 11, 2016

Cybercriminals constantly engage organizations in a game of leapfrog: system defenses improve, so malware searches for new holes. Recently ransomware has been gaining momentum.

Learn about this threat, its impact and ways to avoid attacks.

  • mimecast
  • Security Management & Analytics
  • Security Monitoring
  • Details

Top 5 SIEM challenges for the midmarket

by Arctic Wolf NetworksNov 10, 2016

Security Information and Event Management (SIEM) is a great tool that can protect your organization, when implemented well. SIEM is believed to be a core foundation to build a Security Operation Center (SOC). Its popularity is despite the fact that there are no major regulations suggesting to use SIEM.

However, SIEM is like a bike that needs constant pedaling while looking out for traffic and people. In fact, it is an uphill biking that stops when you stop pedaling. Security is a

  • Arctic Wolf Networks
  • Security Management & Analytics
  • Security Monitoring
  • Details

Static code analysis in an Agile world

by Rogue Wave SoftwareNov 09, 2016

To keep pace with ever-increasing customer demands on software functionality and time-to-market expectations, software developers are having to develop higher quality code faster.

As a result, Agile development is becoming more common. However, to fully realize the benefits of Agile, a repeatable process for ensuring code is free of defects and security vulnerabilities is critical. This paper examines how source code analysis can enhance the Agile development process and empower Agile

  • Rogue Wave Software
  • Security Management & Analytics
  • Security Monitoring
  • Details