Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Getting the Most from Threat Intelligence

by ThreatConnectJan 23, 2020

To get the most out of your relationships with information sharing groups (ISACs) and your threat intelligence feeds, you must understand how, why, and when other organizations' cyber attacks relate to your own organization. In this webinar, learn how to take a fresh look at external threat intelligence and ensure you have an up-to-date view of attackers? means, motives and opportunity.

  • Threat Intelligence
  • Vulnerabilities & Threats
  • Attacks
  • Details

The State of Cloud Computing

by Informa TechJan 23, 2020

Responses to our recently conducted State of Cloud Computing Survey reveal incremental shifts in how organizations are planning their cloud spending for the next two years. However, a closer examination shows the drastic differences in the needs that are driving how companies expect to spend. Find out what the survey revealed by downloading your copy of the report today.

Brought to you by:

  • Informa Tech
  • Cloud
  • IT Strategy
  • Details

Phishing Campaign Targets Multiple U.S. and International Government Procurement Services

by AnomaliJan 23, 2020

Global Phishing Campaign Spoofs Multiple Government Procurement Services With Credential Harvesting

Anomali researchers have identified a credential harvesting campaign designed to steal the login credentials for multiple government procurement services from a range of countries. The procurement services are used by multiple public sector organizations to match buyers and suppliers.

This whitepaper aims to provide an overview of the discovered phishing campaign, as Anomali

  • Anomali
  • Security Management & Analytics
  • Security Monitoring
  • Details

Malicious Activity Aligning with Gamaredon TTPs Targets Ukraine

by AnomaliJan 23, 2020

Russia-Sponsored APT Group, Gamaredon (Primitive Bear), Believed Responsible for Ukraine Targeting

The Anomali Threat Research (ATR) team has identified malicious activity that they believe is being conducted by the Russia-sponsored Advanced Persistent Threat (APT) group, Gamaredon (Primitive Bear). Lure documents observed appear to target Ukrainian entities such as diplomats, government employees, military officials, and more.

The object of this report is to highlight new

  • Anomali
  • Security Monitoring
  • Security Management & Analytics
  • Details

The Lure of PSD2: Anomali Threat Research

by AnomaliJan 23, 2020

While PSD2 Legislation Aims at Reducing Payment Fraud for the Financial Industry, Threat Actors See an Opportunity to Lure New Phishing Victims

PSD2 is a directive aimed at regulating payment services with the intention to make cross-border payments in the EU as easy, efficient, and secure as payments within a member state. PSD2 builds on the previous legislation, and the UK Financial Conduct Authority (FCA) has agreed to a phased roll-out plan to full compliance by March 2021. As efforts

  • Anomali
  • Security Monitoring
  • Security Management & Analytics
  • Details

Service Account Security for Dummies eBook

by ThycoticJan 21, 2020

Get control of service account sprawl and develop a strategy to properly protect and secure service account access to lock down your privileged account attack surface. Learn about service account governance and day-to-day best practices, and the key criteria for managing them with automated cyber security tools.

  • Thycotic
  • Risk Management/Security
  • Cybersecurity
  • Details

2019 State of Privileged Access Management (PAM) Maturity Report

by ThycoticJan 21, 2020

With up to 80 percent of breaches due to compromised credentials, more organizations than ever before are prioritizing privileged account protection. Thycotic's "State of PAM Maturity" report highlights the disturbing results based on more than 450 responses worldwide to our online PAM Maturity Assessment.

See the three major key takeaways from the survey and recommendations for action in the complete 2019 State of Privileged Access Management (PAM) Maturity Report.
85% are still

  • Thycotic
  • Cybersecurity
  • Risk Management/Security
  • Details

Privileged Account Incident Response Template

by ThycoticJan 21, 2020

Thycotic's free Privileged Account Incident Response template is designed to prevent a cyber breach from becoming a cyber catastrophe. It helps IT operations, security and incident response teams form a united front against an attack to coordinate actions and maintain business continuity.

  • Thycotic
  • Risk Management/Security
  • Cybersecurity
  • Details

Black Hat 2019 Hacker Survey Report

by ThycoticJan 21, 2020

Both hackers and security pros strongly agree that service accounts are an attractive target because hackers can easily elevate privileges and gain access to sensitive information. Yet one in three security pros say service account passwords are changed only after an incident or never rotated!

  • Thycotic
  • Cybersecurity
  • Risk Management/Security
  • Details

2020 IT Salary Report | How Do You Compare to Your Peers?

by Informa TechJan 16, 2020

Now is the time for you to create a new plan by evaluating what you earn, what you are worth, and where you want to grow. Download this report to help evaluate your value and worth in the IT professional job market for 2020.

InformationWeek surveyed full-time staff and management IT professionals employed in the United States with questions related to salaries, benefits, certifications, skills, and job satisfaction. The economy is strong, and U.S. IT professionals are reaping the

  • Professional Development and Salary Data
  • IT Strategy
  • Informa Tech
  • Details