TECH DIGITAL RESOURCE LIBRARY

Banking

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:






IT Authorities Sees Increased Productivity

by VeriatoJan 19, 2017

IT Services Provider Sees Increased Productivity with Veriato 360 Employee Monitoring Software.


Predictive Intelligence: Pre-crime For IT

by Cisco UmbrellaSep 15, 2016

Today's sophisticated attacks routinely evade conventional after-the-fact technologies such as firewalls and signature-based malware detection. Therefore, it's essential to adopt new measures that neutralize these new threats.

Download this white paper to learn how a predictive IT strategy can help you prevent attacks before they're fully launched and stop command-and- control infiltrations before they do real harm.


Weathering an Insecure World

by Terbium LabsAug 26, 2016

Information security is in the midst of a major shift. What had been a purely technical, defensive, IT problem is now a whole-organization risk management problem. As the industry undergoes this wholesale shift in mindset, enterprises are struggling to catch up. Gone are the days of installing a few defensive products to feel relatively secure in its perimeter and would be understood by its investors, partners, and customers to have taken adequate precautions. The sophistication of threats and


Dark Reading Tech Digest: Cybersecurity Threats

by Dark ReadingDec 07, 2016

In this special digital edition of Dark Reading, we cover how business executives should plan for and respond to cybersecurity threats. This issue includes: Five Things Every Business Executive Should Know About Cybersecurity Why Poor Cyber Hygiene Invites Risk The 4 Biggest Mistakes Businesses Make Trying to Secure Endpoints Improving the Security Conversation for CIOs, CISOs, and Board Members Download the issue today!

The information submitted is collected by both UBM and our


Shooting the Messenger: Understanding the Threats to the Media and Broadcasting Industry

by Digital ShadowsNov 16, 2016

Amid all of the noise, it's often tricky for organizations to identify and prioritize the threats they face online. Organizations in the media and broadcasting industry are no exception.

This paper explores:
- Trends in the threats seen in 2016 for broadcasting and media organizations
- The steps that can be taken to prevent and mitigate potential threats


Defend against injection attacks

by Rogue Wave SoftwareNov 09, 2016

As our reliability on software grows each day, it becomes imperative that we implement software in the most secure manner possible.

In this white paper we'll explore the risk of injection attacks, how to prevent these vulnerabilities in your software, and how static code analysis can help.


White Paper: Replace AV and Meet Anti-Malware Compliance Requirements

by Carbon BlackNov 02, 2016

Now you can replace your ineffective AV solution and still meet PCI DSS anti-malware requirements with Cb Defense. Learn how.


Replace AV with Cb Defense

by Carbon BlackNov 02, 2016

Learn why organizations are replacing traditional antivirus (AV) with next-generation AV (NGAV) offering simple to manage, full-spectrum prevention and advanced attack analytics.


Weakest Link - Why People Are Your Network's Greatest Vulnerability

by PhishLabsNov 01, 2016

Right now, employees all over the world are woefully unprepared to handle the onslaught of social engineering attacks they're faced with. They're too busy, uninformed, and unsuspecting to identify even the most basic of phishing emails, and that needs to change.

In this white paper, we explore why people are the biggest vulnerability for most organizations, and whether it's possible to 'patch' this vulnerability. After reviewing this white paper, security leaders will


Security Awareness Training Buyer's Guide

by PhishLabsJun 09, 2016

Employees are attackers' top targets. And they're usually considered the top security risk, typically clicking on 20% of phish. The vast majority of headline data breaches in recent years have all begun with spear phishing attacks. Because of this, organizations are aggressively seeking out security awareness training (SAT) programs to mitigate the threat. A successful program can convert employees from a vulnerability to an asset by greatly increasing their awareness of threats and equipping


SUBTOPICS:

Carbon Black

Carbon Black has designed the most complete next-gen endpoint-security platform, enabling organizations to stop the most attacks, see every threat, close security gaps, and evolve their defenses. The Cb Endpoint Security Platform helps organizations of all sizes replace legacy antivirus technology, lock down systems, and arm incident response teams with advanced tools to proactively hunt down threats. Today, Carbon Black has approximately 2,000 worldwide customers, including 25 of the Fortune 100 and more than 600 employees. Carbon Black was voted Best Endpoint Protection by security professionals in the SANS Institute's Best of 2015 Awards.


Cisco Umbrella

Avoid the aftermath with a before strategy. Cisco Umbrella is a cloud security platform that provides the first line of defense against threats on the internet wherever users go.


Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


Digital Shadows

Digital Shadows provides cyber situational awareness to help organizations protect against cyber attacks, loss of intellectual property, and loss of brand and reputational integrity. We are jointly headquartered in London and San Francisco. Digital Shadows helps large multi-national organizations in sectors including finance, retail, pharmaceuticals and oil and gas. Our flagship solution, Digital Shadows SearchLight,is a scalable and easy-to-use data analysis platform that provides a complete view of an organization's digital footprint and the profile of its attackers. SearchLight is complemented with support from our world-class intelligence operations team to ensure extensive coverage, tailored intelligence and frictionless deployment. Digital Shadows helps our customers see their organizations through an "attacker's eye view" and keep their assets and reputation intact.


PhishLabs

Headquarters: Charleston, SC

PhishLabs is the leading provider of 24/7 cybersecurity services that protect against threats that exploit people. The company is trusted by top organizations worldwide, including four of the five largest U.S. financial institutions. PhishLabs combines proprietary technology, intelligence, and human expertise to rapidly detect, analyze, and stop targeted cyberattacks before they impact organizations. Additionally, the company provides robust threat intelligence that strengthens existing cyber defenses and optimizes threat prevention. Leading organizations partner with PhishLabs to more effectively disrupt targeted cyberattacks, prevent data breaches, and reduce online fraud.


Rogue Wave Software

Rogue Wave Software, Inc. is the leading provider of enterprise class C++ components and infrastructure that enable organizations to build and deploy high performance applications. Only Rogue Wave provides the most complete C++ technology stack including C++ components, UI components, run-time infrastructure, and services. Today, thousands of organizations worldwide have chosen Rogue Wave.


Terbium Labs

Headquarters: Baltimore, Maryland

At Terbium Labs, we provide proactive solutions beginning with the assumption that your critical data is always at risk. That's why we focus on data intelligence, building systems to find your sensitive information wherever it may appear on the internet. We are an elite group of information security professionals with expertise in everything from cryptography to large-scale information systems. We protect organizations from relentless attempts to steal data for personal, monetary, or political gain. By offering continuous, proactive monitoring of critical data and rapid breach detection, we enable companies to better manage risk and keep high-value data safe.


Veriato

Veriato develops intelligent, powerful solutions that provide companies with visibility into, and understanding of, the human behaviors and activities occurring within their firewall, making them more secure and productive. We provide world-class software and support that enables our customers to protect their most valuable assets, reduce their risk, and gain unparalleled visibility into their operations.