Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Media Under Assault

by AkamaiOct 18, 2019

From January 2018 through June 2019, Akamai recorded more than 61 billion credential stuffing attempts and more than 4 billion web application attacks. In this special edition of the State of the Internet / Security Report, we're focusing on data within the high tech, video media, and entertainment sectors — collectively named Media & Technology.

These three industries accounted for nearly 35% of all credential stuffing attacks, and almost 17% of the web application attacks seen

  • Akamai
  • Security Monitoring
  • Risk Management/Security
  • Details

The 2019 Security Buyer’s Guide

by AkamaiOct 17, 2019

Security is the foundation of digital business innovation.

It's a bold claim; one that hasn't always been accepted as truth. In the not so distant past, digital security was seen as a cost center. Those days are gone.

Security is essential to the success of any digital business. If there is one thing you can always count on, however, it's that security-related incursions are inevitable. And it's news to no one to say that these disruptions can have dire consequences beyond

  • Akamai
  • Network & Perimeter Security
  • Security Monitoring
  • Details

NIST Password Guidelines Best Practices Guide

by SpyCloudOct 17, 2019

Aligning your password policy with the latest guidelines from the National Institute of Standards and Technology (NIST) can help encourage better password habits and reduce the risk of account takeover.

Download this guide to get an overview of required NIST password guidelines and how to implement them. Even if you don't use Microsoft Active Directory, this is still a helpful guide to NIST's latest password recommendations.

  • Spycloud
  • Security Monitoring
  • Database Security
  • Risk Management
  • Details

Productivity in the Workplace: Eyeing Cloud Communications

by FuzeOct 16, 2019

Fundamental shifts are taking place in the workplace and the way we work is changing, driven by technological advancements, an increasingly distributed workforce, and evolving employee demands. A reliance on legacy telephony systems, however, combined with managing the proliferation of applications can be a detriment, making it difficult for teams to master collaborative, productive, and agile ways of working.

  • Unified Communications
  • VOIP
  • Details

Security Automation 101: Change Management and the Complexity Gap

by FireMonOct 16, 2019

Today's threat landscape is constantly evolving. Sophisticated cyber threats are becoming smarter and faster, leading to an increase in security breaches and unprecedented fines for noncompliance. Simultaneously, organizations are rushing to embrace digital transformation, driven by emerging technologies like mobility, cloud computing, large-scale virtualization, software defined networking, and the hyper connected Internet of Things. Yet, organizations worldwide face an inability to hire and

  • Firemon
  • Cybersecurity
  • Cloud Security
  • Risk Management
  • Mobile security
  • Details

5 Steps to Keep Network Security Enforcement Points Secure and Up-To-Date

by FireMonOct 16, 2019

A basic truth in network security is that it's never static. Changes in the network, applications, business strategy, cyberattack vectors and methods, and even the security technologies used all impact your network security configuration. The goal is always to reduce the potential threat surface to as close to zero as is possible, which means you must constantly update firewall rues as you deploy, move, or retire workloads, allowing necessary access but nothing more.

In principal, your

  • Firemon
  • Cybersecurity
  • Network & Perimeter Security
  • Details

Managing Threat Intelligence Playbook

by AnomaliOct 16, 2019

Threat Intelligence for Improved Cyber Threat Mitigation and Accelerated Remediation

Understanding threat intelligence and implementing a threat intelligence solution to enhance your cybersecurity strategy should not be an intimidating process. With a solid plan, your transition to threat intelligence can be smooth, useful, and insightful. This ebook covers the basic steps for successfully adding threat intelligence to your environment, and how to avoid underutilizing it: What

  • Anomali
  • Cybersecurity
  • Risk Management
  • Security Monitoring
  • Details

SANS 2019 Top New Attacks and Threat Report

by AnomaliOct 16, 2019

Basic Security Hygiene Practices are Key to Avoiding the Majority of Commodity Attacks

There is no shortage of media coverage of cybersecurity breaches and outages, and there are many places to find statistics about how many attacks were launched in cyberspace. What is harder to find is expert advice on areas that are worth focusing your resource and efforts on in an effort to protect your organization.

This SANS whitepaper analyzes a baseline of breach and malware data from

  • Anomali
  • Cybersecurity
  • Risk Management
  • Details

SANS 2019 SOC Survey

by AnomaliOct 16, 2019

SANS Common and Best Practices for Security Operations Centers (SOC)

Lack of skilled staff, budget, and effective automation are the most commonly cited reasons for failing to achieve excellence in existing SOCs. To gain management support for resources, SOC managers need to move beyond quantity-based metrics to business-relevant metrics.

In this survey, senior SANS instructor and course author Christopher Crowley, along with advisor and SANS director of emerging technologies

  • Anomali
  • Network & Perimeter Security
  • Cybersecurity
  • Mobile security
  • Details

SC Media Expert Focus: The Community Approach to Sharing Security Intel

by AnomaliOct 16, 2019

When Everyone Participates—Sharing and ISACs Can Be a Vital Source of Security Intelligence

Information Sharing Analysis Centers (ISACs) are private sector organizations that are sometimes known as Information Sharing and Analysis Organizations (ISAOs). They are one of the most effective weapons against mass cyberattacks, but companies often join ISACs without a firm plan in place on how to interact and leverage threat intel for the biggest return.

The key challenge

  • Anomali
  • Cybersecurity
  • Security Monitoring
  • Details