Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...


Cybersecurity Strategies for the Digital Era

by InformationWeekJun 11, 2018

This InformationWeek Trend Report explores several areas of information security that are critical to ensuring the growth of the modern business.

• Learn how cybersecurity initiatives can contribute to new business growth
• Find out how digital and physical security must work together and read our 4-step plan for implementation
• Explore strategies for integrating DevOps into IT security to improve application security and performance

Identity and Access Management Program Primer

by OptivMay 01, 2018

As the enterprise perimeter dissolves, compliance mandates are becoming increasingly detailed around access to data and intellectual property that is increasingly off-premise. Failing to address identity and access management with a holistic access strategy cripples security performance, increases IT overhead and adversely affects profitability. This IAM primer offers an overview of how to transform an IAM team to leaders in providing IAM security program maturity.

Unstructured Data Risk Assessment

by OptivMay 01, 2018

As your organization grows, are you concerned about the risks associated with the exfiltration of sensitive corporate data that has been exported to unstructured files, such as PowerPoint, Word or Excel? And, how that same unstructured data is liable to compliance requirements? Understand more on how Optiv can provide a review of your environment focusing on a risk assessment for both Active Directory and unstructured data.

Privileged Access Managed Service

by OptivMay 01, 2018

Is your organization short on skilled resources for managing and monitoring your privileged access management environment? Learn more on how Optiv's PAM engineers and threat analysts, can help control costs, increase security and reduce risk of a breach related to privileged accounts.

[Slideshow] 7 Steps to a Smooth, Secure Cloud Transition

by Dark ReadingApr 27, 2018

If you're thinking with a cloud-first mindset, you should be making sure all the right boxes are checked before you make the leap. Here, security experts highlight the most important steps to keep in mind while moving to the cloud. Find out what they had to say.

[Slideshow] 10 Mistakes End Users Make That Drive Security Managers Crazy

by Dark ReadingApr 27, 2018

We pinpointed 10 common ways employees mishandle - and inadvertently breach - an organization's security. Find out what they are here.

[Slideshow] 7 Key Stats that Size Up the Cybercrime Deluge

by Dark ReadingApr 27, 2018

Now that we've got a couple of months from this year in the rearview mirror, security researchers have had enough time to crunch the numbers from 2017. That means a raft of new reports analyzing last year's cybersecurity data with updated telemetry on the threat landscape, economic impact, and defense problems facing the cybersecurity industry. Here are some of the most illuminating highlights.

Security Concerns to the Aviation Industry

by AnomaliApr 03, 2018

The aviation industry faces threats from a variety of angles, including human and mechanical failure, geopolitics, and even the weather. With advances in everything from on-board entertainment systems, modern avionics, logistics and big data, and digital communications, the security concerns to the industry are daunting. This report explores some of the security challenges faced by the aviation industry and takes a peek at some challenges to come. The report wraps up with some suggestions on how

United Kingdom Threat Landscape

by AnomaliMar 16, 2018

The United Kingdom (UK) is a country that is geographically small (ranked 78th in the world by geographic size) but carries significant global political and diplomatic influence. The UK boasts the 6th largest economy based on GDP. It is perhaps due to these latter points that the UK is a target for APT groups, cyber criminals, and hacktivists.

Defending its critical infrastructure against these and other threats is a major challenge for cyber defense in the UK. A number of attacks have

Instill Long-Term Behavioral Change with Terranova’s 3D Model

by TerranovaMar 15, 2018

When planning a security awareness program, changing employee behavior can prove to be quite a challenge. Terranova's 3D Model demonstrates how security professionals can achieve successful behavioral change within their organization.



Anomali delivers earlier detection and identification of adversaries in your organizations network by making it possible to correlate tens of millions of threat indicators against your real time network activity logs. Anomali's approach enables detection at every point along the kill chain, making it impossible to mitigate threats before material damage to your organization has occurred.

Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


Headquarters: 2 Penn Plaza, 15th Floor, New York, NY, 10121 United States

InformationWeek is the leading multimedia Business Technology brand providing CIOs and IT decision makers with unique perspective and tools that work in lock step with their decision making process - from the setting of business strategies to the evaluation and recommendation of technology solutions. Through its cross-media platform, which includes online sites, magazine, events and research, InformationWeek provides editorial content developed by both journalists and CIO and IT peers delivered when and how they want it, 24/7. The InformationWeek audience of more than 2 million buyers includes CIOs, IT executives and business managers who span across industries, job titles, company sizes and global borders.


Headquarters: Denver, CO

Your cyber security needs are every bit as unique as your business. That's why we work closely with you and your team to plan, build and run successful security programs tailored to your needs. Although the demands and complexities of cyber security evolve rapidly, we've got your back.

When you work with us, you get the benefit of our:

  • Deep industry insight, based on more than 20 years combined experience
  • Proven know-how from over 1,200 experts, including former CIOs and CISOs, risk experts, compliance experts, software engineers, researchers, white hat hackers, engineers, architects and more
  • Strategic partnerships with more than 350 leading and emerging security technology providers, so you get the right solutions the knowledge to make it all work together
  • Proprietary technology platform and tools based on experience we've gained from thousands of engagements with leading businesses in many industries

As a result, you achieve more efficient solutions, more optimized implementations and greater scale. Working together, we meet the challenges of security head on so you can do business with confidence.


Terranova WW Corporation, a privately held company incorporated in 2001, is made up of a team of professionals dedicated to providing information security awareness programs customized to your internal policies and procedures. In recent years, Terranova has expanded its offering to products and services for regulatory compliance, privacy, business continuity management and sustainable development. Headed by a team of technology, education and security professionals with over 25 years of experience, we work in close partnership with you, so together we can develop the program that best meets your present and anticipated needs.