TECH DIGITAL RESOURCE LIBRARY

Strategic CIO

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







The Risk Management Struggle

by Dark ReadingSep 19, 2018

Dark Reading's 2018 Strategic Security Survey of 300 IT and security professionals indicates that a majority of organizations are struggling to implement a risk-based approach to security — even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. The information submitted is collected by both UBM and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Build the Best IT Budget for 2019

by InformationWeekSep 10, 2018

Budgeting season is here, which means it's the perfect time to examine your IT practices, systems and tools. Is your organization balancing the promise of emerging technologies with practicality of implementation, while at the same time taking user needs into account?

This InformationWeek Trend Report will help you get in the frame of mind for the coming budget season and will explore how to move ahead with technology while staying within cost limitations.

In this Report


Research Report: How Data Breaches Affect the Enterprise

by Dark ReadingAug 30, 2018

Despite the escalation of cybersecurity staffing and technology, enterprises continue to suffer data breaches and compromises at an alarming rate. How do these breaches occur? How are enterprises responding, and what is the impact of these compromises on the business? This report, one of three to come out of Dark Reading's annual Strategic Security Survey, offers new data on the frequency of data breaches, the losses they cause, and the steps that organizations are taking to prevent them in the


3 Steps to Securing Enterprise Data on Cloud Platforms

by ReliaQuest LLCAug 14, 2018

Improve security and monitoring of AWS, Azure & Google Cloud.


The Log Parsing Challenge

by ReliaQuest LLCAug 14, 2018

Learn how to drive consistent security and unexpected value with log parsing


Overly Managed Security

by ReliaQuest LLCAug 14, 2018

In today's world of cybersecurity threats, the biggest challenge of all may be rethinking our approach.


Application Logging Challenges

by ReliaQuest LLCAug 14, 2018

Best practices for logging hosted /3rd party apps to get full visibility into security environments.


5 Approaches to Consistently Evolving Security

by ReliaQuest LLCAug 14, 2018

Best practices to drive security consistency in an inconsistent world.


10 Emerging Threats Every Enterprise Should Know About

by Dark ReadingAug 13, 2018

This Dark Reading's August Tech Digest explores ten emerging security threats to enterprise data.

IN THIS REPORT: 10 Emerging Threats Every Enterprise Should Know About Trading Platforms Riddled with Severe Flaws Cracking Cortana: The Dangers of Flawed Voice Assistants Demystifying Mental Health in the Infosec Community New Hack Weaponizes the Web Cache The information submitted is collected by both UBM Tech and our sponsors.
UBM Tech's privacy policy.
Cofense


Beginner's Guide to Brute Force & DDoS Attacks

by AlienVaultJul 30, 2018

Although distributed denial of service and brute force attacks are relatively simple strategies for attackers to implement, they can wreak havoc on your organization if you don't understand how to detect and respond to them appropriately. In this paper we'll explore both types of attacks and provide guidance on what you should do if you encounter one.

You'll read about:

• Different types of DDoS and brute force attacks
• How to identify DDoS and brute force


SUBTOPICS:

AlienVault

At AlienVault, we believe that open and collaborative is the best way for all companies to gain the security visibility they need. Our Unified Security Management (USM) platform provides a fast and cost-effective way for organizations with limited security staff and budget to address compliance and threat management needs. With all of the essential security controls already built-in, through out of the box integrations with dozens of sophisticated open source security technologies, USM puts enterprise-class security visibility within easy reach of smaller security teams who need to do more with less. AlienVault USM customers include government and educational entities, and enterprises of all sizes around the globe. For more information visit www.alienvault.com, or download the free 30-day trial: www.alienvault.com/free-trial


Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


InformationWeek

Headquarters: 2 Penn Plaza, 15th Floor, New York, NY, 10121 United States

InformationWeek is the leading multimedia Business Technology brand providing CIOs and IT decision makers with unique perspective and tools that work in lock step with their decision making process - from the setting of business strategies to the evaluation and recommendation of technology solutions. Through its cross-media platform, which includes online sites, magazine, events and research, InformationWeek provides editorial content developed by both journalists and CIO and IT peers delivered when and how they want it, 24/7. The InformationWeek audience of more than 2 million buyers includes CIOs, IT executives and business managers who span across industries, job titles, company sizes and global borders.


ReliaQuest LLC

SECURITY IS ALL WE DO. From our earliest days, we've been laser-focused on delivering operational excellence in cybersecurity. No managed services engagements. No consulting models. No value-added products or services. Just a commitment to help Make Security Possible for enterprise leaders looking to unlock the true potential in their data.