TECH DIGITAL RESOURCE LIBRARY

Banking

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







3 Steps to Securing Enterprise Data on Cloud Platforms

by ReliaQuest LLCAug 14, 2018

Improve security and monitoring of AWS, Azure & Google Cloud.


The Log Parsing Challenge

by ReliaQuest LLCAug 14, 2018

Learn how to drive consistent security and unexpected value with log parsing


Overly Managed Security

by ReliaQuest LLCAug 14, 2018

In today's world of cybersecurity threats, the biggest challenge of all may be rethinking our approach.


Application Logging Challenges

by ReliaQuest LLCAug 14, 2018

Best practices for logging hosted /3rd party apps to get full visibility into security environments.


5 Approaches to Consistently Evolving Security

by ReliaQuest LLCAug 14, 2018

Best practices to drive security consistency in an inconsistent world.


10 Emerging Threats Every Enterprise Should Know About

by Dark ReadingAug 13, 2018

This Dark Reading's August Tech Digest explores ten emerging security threats to enterprise data.

IN THIS REPORT: 10 Emerging Threats Every Enterprise Should Know About Trading Platforms Riddled with Severe Flaws Cracking Cortana: The Dangers of Flawed Voice Assistants Demystifying Mental Health in the Infosec Community New Hack Weaponizes the Web Cache The information submitted is collected by both UBM Tech and our sponsors.
UBM Tech's privacy policy.
Cofense


Beginner's Guide to Brute Force & DDoS Attacks

by AlienVaultJul 30, 2018

Although distributed denial of service and brute force attacks are relatively simple strategies for attackers to implement, they can wreak havoc on your organization if you don't understand how to detect and respond to them appropriately. In this paper we'll explore both types of attacks and provide guidance on what you should do if you encounter one.

You'll read about:

• Different types of DDoS and brute force attacks
• How to identify DDoS and brute force


Cybersecurity Strategies for the Digital Era

by InformationWeekJun 11, 2018

This InformationWeek Trend Report explores several areas of information security that are critical to ensuring the growth of the modern business.

IN THIS REPORT:
• Learn how cybersecurity initiatives can contribute to new business growth
• Find out how digital and physical security must work together and read our 4-step plan for implementation
• Explore strategies for integrating DevOps into IT security to improve application security and performance


Identity and Access Management Program Primer

by OptivMay 01, 2018

As the enterprise perimeter dissolves, compliance mandates are becoming increasingly detailed around access to data and intellectual property that is increasingly off-premise. Failing to address identity and access management with a holistic access strategy cripples security performance, increases IT overhead and adversely affects profitability. This IAM primer offers an overview of how to transform an IAM team to leaders in providing IAM security program maturity.


Unstructured Data Risk Assessment

by OptivMay 01, 2018

As your organization grows, are you concerned about the risks associated with the exfiltration of sensitive corporate data that has been exported to unstructured files, such as PowerPoint, Word or Excel? And, how that same unstructured data is liable to compliance requirements? Understand more on how Optiv can provide a review of your environment focusing on a risk assessment for both Active Directory and unstructured data.


SUBTOPICS:

AlienVault

At AlienVault, we believe that open and collaborative is the best way for all companies to gain the security visibility they need. Our Unified Security Management (USM) platform provides a fast and cost-effective way for organizations with limited security staff and budget to address compliance and threat management needs. With all of the essential security controls already built-in, through out of the box integrations with dozens of sophisticated open source security technologies, USM puts enterprise-class security visibility within easy reach of smaller security teams who need to do more with less. AlienVault USM customers include government and educational entities, and enterprises of all sizes around the globe. For more information visit www.alienvault.com, or download the free 30-day trial: www.alienvault.com/free-trial


Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


InformationWeek

Headquarters: 2 Penn Plaza, 15th Floor, New York, NY, 10121 United States

InformationWeek is the leading multimedia Business Technology brand providing CIOs and IT decision makers with unique perspective and tools that work in lock step with their decision making process - from the setting of business strategies to the evaluation and recommendation of technology solutions. Through its cross-media platform, which includes online sites, magazine, events and research, InformationWeek provides editorial content developed by both journalists and CIO and IT peers delivered when and how they want it, 24/7. The InformationWeek audience of more than 2 million buyers includes CIOs, IT executives and business managers who span across industries, job titles, company sizes and global borders.


Optiv

Headquarters: Denver, CO

Your cyber security needs are every bit as unique as your business. That's why we work closely with you and your team to plan, build and run successful security programs tailored to your needs. Although the demands and complexities of cyber security evolve rapidly, we've got your back.

When you work with us, you get the benefit of our:

  • Deep industry insight, based on more than 20 years combined experience
  • Proven know-how from over 1,200 experts, including former CIOs and CISOs, risk experts, compliance experts, software engineers, researchers, white hat hackers, engineers, architects and more
  • Strategic partnerships with more than 350 leading and emerging security technology providers, so you get the right solutions the knowledge to make it all work together
  • Proprietary technology platform and tools based on experience we've gained from thousands of engagements with leading businesses in many industries

As a result, you achieve more efficient solutions, more optimized implementations and greater scale. Working together, we meet the challenges of security head on so you can do business with confidence.


ReliaQuest LLC

SECURITY IS ALL WE DO. From our earliest days, we've been laser-focused on delivering operational excellence in cybersecurity. No managed services engagements. No consulting models. No value-added products or services. Just a commitment to help Make Security Possible for enterprise leaders looking to unlock the true potential in their data.