TECH DIGITAL RESOURCE LIBRARY

Banking

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







Top 5 Log Sources You Should Be Ingesting but Probably Aren’t

by ReliaQuest LLCOct 18, 2018

Logging Tips That Save Money and Enhance Security.


For More Effective Endpoint Security, Improve Your Endpoint Management E-Book

by LogMeInOct 17, 2018

A recent analysis by Aberdeen Group shows that the volume of critical endpoint vulnerabilities, and the percentage of vulnerabilities being exploited have grown significantly in the last two years.


Design Secure Software from the First Line of Code

by WhiteHat SecurityOct 13, 2018

Have you ever discovered flaws in your applications after they've been released to the public? As developers push applications out the door at increasingly faster rates, it's crucial that security vulnerabilities are discovered during the development process. Because by the time security teams uncover these flaws, costs of remediating vulnerabilities skyrocket and development teams are onto the next sprint.

Download this white paper for keen insights into:
• Why security needs to


Securing your Code for GDPR Compliance

by WhiteHat SecurityOct 13, 2018

Writing code for compliance standards is still a young discipline; while PCI DSS has provided directives for applications security testing and check, GDPR has been less specific with its directive that new portals, websites, and applications which touch EU Citizen data be developed according to the principles of Privacy by Design.

What does that mean to the Application and Solution Architect? It means they need to figure out how to secure all future releases of applications, both web and


And Now, a Word from a Hacker

by CylanceOct 09, 2018

Anyone can learn how to be a hacker. It's actually quite simple. And, most modern systems remain defenseless against many basic methodologies. Read this news bite to learn tactics for hacking an Instagram account password.


WannaCry: One Year Later

by AnomaliOct 01, 2018

This white paper analyses the WannaCry ransomware attack that occurred in May 2017. It delves into how things have evolved in the past year to observe whether companies and organizations have modified and changed to address the issues WannaCry highlighted. The report investigates the technical aspects of the attack, the consequences for organizations, and the lessons learned.

Good cybersecurity behaviors like immediately implementing critical patches to systems, utilizing multi-factor


How to Build Security Into Your Software Development

by Synopsys Inc.Sep 28, 2018

Whether you use Agile, Waterfall, or something in between, building security into your SDLC can improve efficiency and reduce costs if it's done the right way.


Beginner's Guide to Brute Force & DDoS Attacks

by AlienVaultJul 30, 2018

Although distributed denial of service and brute force attacks are relatively simple strategies for attackers to implement, they can wreak havoc on your organization if you don't understand how to detect and respond to them appropriately. In this paper we'll explore both types of attacks and provide guidance on what you should do if you encounter one.

You'll read about:

• Different types of DDoS and brute force attacks
• How to identify DDoS and brute force


The Risk Management Struggle

by Dark ReadingSep 19, 2018

Dark Reading's 2018 Strategic Security Survey of 300 IT and security professionals indicates that a majority of organizations are struggling to implement a risk-based approach to security — even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. The information submitted is collected by both UBM and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Build the Best IT Budget for 2019

by InformationWeekSep 10, 2018

Budgeting season is here, which means it's the perfect time to examine your IT practices, systems and tools. Is your organization balancing the promise of emerging technologies with practicality of implementation, while at the same time taking user needs into account?

This InformationWeek Trend Report will help you get in the frame of mind for the coming budget season and will explore how to move ahead with technology while staying within cost limitations.

In this Report


SUBTOPICS:

AlienVault

At AlienVault, we believe that open and collaborative is the best way for all companies to gain the security visibility they need. Our Unified Security Management (USM) platform provides a fast and cost-effective way for organizations with limited security staff and budget to address compliance and threat management needs. With all of the essential security controls already built-in, through out of the box integrations with dozens of sophisticated open source security technologies, USM puts enterprise-class security visibility within easy reach of smaller security teams who need to do more with less. AlienVault USM customers include government and educational entities, and enterprises of all sizes around the globe. For more information visit www.alienvault.com, or download the free 30-day trial: www.alienvault.com/free-trial


Anomali

Anomali delivers earlier detection and identification of adversaries in your organizations network by making it possible to correlate tens of millions of threat indicators against your real time network activity logs. Anomali's approach enables detection at every point along the kill chain, making it impossible to mitigate threats before material damage to your organization has occurred.


Cylance

Cylance has redefined endpoint security. Our products and services aim to predict and prevent, rather than reactively detect, the execution of advanced threats. Deployed on over 14.5 million endpoints, we protect clients worldwide including Fortune 100 organizations and governments.


Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


InformationWeek

Headquarters: 2 Penn Plaza, 15th Floor, New York, NY, 10121 United States

InformationWeek is the leading multimedia Business Technology brand providing CIOs and IT decision makers with unique perspective and tools that work in lock step with their decision making process - from the setting of business strategies to the evaluation and recommendation of technology solutions. Through its cross-media platform, which includes online sites, magazine, events and research, InformationWeek provides editorial content developed by both journalists and CIO and IT peers delivered when and how they want it, 24/7. The InformationWeek audience of more than 2 million buyers includes CIOs, IT executives and business managers who span across industries, job titles, company sizes and global borders.


LogMeIn

LogMeIn is a leading provider of on-demand, remote-connectivity and support solutions to small businesses, IT service providers and consumers. Businesses and IT service providers use LogMeIn's solutions to deliver remote end-user support and to access and manage computers and other Internet-enabled devices more effectively and efficiently. Consumers and mobile workers use our solutions to access computer resources remotely, thereby facilitating their mobility and increasing their productivity. Our solutions, which are deployed on-demand and accessible through a Web browser, are secure, scalable and easy for our customers to try, purchase and use. Since our inception, our users have connected over 50 million computers and other Internet-enabled devices to a LogMeIn service.


ReliaQuest LLC

SECURITY IS ALL WE DO. From our earliest days, we've been laser-focused on delivering operational excellence in cybersecurity. No managed services engagements. No consulting models. No value-added products or services. Just a commitment to help Make Security Possible for enterprise leaders looking to unlock the true potential in their data.


WhiteHat Security

WhiteHat Security has been in the business of securing web applications for 17 years. Combining advanced technology with the expertise of its global Threat Research Center (TRC) team, WhiteHat delivers application security solutions that reduce risk, reduce cost and accelerate the deployment of secure applications and web sites. The company's flagship product, WhiteHat Sentinel, is a software-as-a-service platform providing dynamic application security testing (DAST), static application security testing (SAST), and mobile application security assessments. The company is headquartered in San Jose, Calif., with regional offices across the U.S. and Europe.