Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Winning at Cyberrisk Management

by CovailSep 29, 2020

Discover how real operational risk prioritization can make the process more efficient and effective

Download the eBook learn: Learn how to manage vulnerabilities effectively. Gain insights on Vulnerability Best Practices. Discover the ways your company might be vulnerable to risk.

  • Covail
  • Cybersecurity
  • Risk Management/Security
  • Details

IDC Report: Qualys Moves into the Burgeoning EDR Space

by Qualys Inc.Sep 29, 2020

Qualys' in-house context and vulnerability management-driven prioritization combined with external context gives it the opportunity to achieve something greater than the majority of the EDR market.

The IDC Link report on Qualys' move into the endpoint detection and response (EDR) space notes that Qualys is delivering a compelling offer that links core EDR functionality with vulnerability and system visibility. The Qualys Multi-Vector EDR solution looks at the main threats and malicious

  • Qualys Inc.
  • Cybersecurity
  • Endpoint Security
  • Details

Vulnerability Management for Financial Companies

by CovailSep 29, 2020

Financial industries are a consistent target for cyberattacks and held to a higher security standard because of their management of sensitive information. It is possible to comply with regulations and stay one step ahead of internal and external bad actors. Download this use case to see how.

  • Covail
  • Risk Management/Security
  • Cybersecurity
  • Details

Building an Effective Cybersecurity Incident Response Team

by Dark ReadingSep 28, 2020

Today's enterprises are under attack. Whether it's malware, ransomware, social engineering, or targeted exploits, security teams must be ready to detect these cyber attacks, analyze the threat, and launch a quick and effective response. Is your organization ready?

There are a wide variety of IT security tools available for cyber incident response. But most organizations have discovered that it's people — the analysts and technicians who make up the cyber response team —

  • Dark Reading
  • Cybersecurity
  • Security Management & Analytics
  • Details

Get Your Security Tools Talking for More Effective Incident Response

by SwimlaneSep 24, 2020

How your team responds to an incident has a tremendous impact on the outcome. But with the average organization using dozens upon dozens of security tools, each with its own alerts, interfaces, and logins, it can be tough to respond to incidents quickly. How do you manage a well-orchestrated, repeatable and effective incident response in the midst of tool chaos and a changing threat landscape? Join this webinar with Jake Gillen, SOAR Engineer, and Julie Rockett, Senior Product Marketing Manager,


Get Your Security Tools Talking for More Effective Incident Response

by SwimlaneSep 24, 2020

How your team responds to an incident has a tremendous impact on the outcome. But with the average organization using dozens upon dozens of security tools, each with its own alerts, interfaces, and logins, it can be tough to respond to incidents quickly. How do you manage a well-orchestrated, repeatable and effective incident response in the midst of tool chaos and a changing threat landscape? Join this webinar with Jake Gillen, SOAR Engineer, and Julie Rockett, Senior Product Marketing Manager,


Aligning Cyber Skills to the MITRE ATT&CK Framework

by Immersive LabsSep 24, 2020

In order to keep pace with hackers, you need to learn like hackers. That's why when it comes to guidance on building detection and response programs, MITRE ATT&CK® — which has a strong adversarial focus — trumps traditional frameworks such as the Diamond Model (which lacks technical depth), and Lockheed Martin's Cyber Kill Chain (which offers little from the attacker's perspective).

So, how can you maximize MITRE ATT&CK framework to bolster your cyber skills strategy?

  • Security Management & Analytics
  • Network & Perimeter Security
  • Details

The Ultimate Cyber Skills Strategy Cheat Sheet

by Immersive LabsSep 24, 2020

No one needs more stats about the skills gap in cybersecurity; many organizations are obviously facing challenges in recruiting, skilling, and retaining security professionals. This cheat sheet wasn't created to tell you what you already know. Instead, it outlines a realistic strategy for workforce-wide cyber skills development, focusing on the solution, not just the problem.

• The state of cybersecurity skills
• Debunking the cybersecurity myths
• The power in

  • Immersive Labs
  • Cybersecurity
  • Security Management & Analytics
  • Details

Osterman Research: Cyber Crisis Response - Fit For Today's Threat Landscape?

by Immersive LabsSep 24, 2020

Cyber crisis response and preparedness is on everyone's lips, yet organizations' efforts are failing to adapt to modern threats. While table top exercises have long been considered an essential tool in preparing organizations to face cyber crises, they're now rapidly falling into obsolescence.

So what's the alternative? How many organizations still rely on PowerPoint-driven table exercises to bolster their incident response plans? Is this legacy method of defining cyber crisis

  • Immersive Labs
  • Cybersecurity
  • Security Management & Analytics
  • Details

Edge Computing: An IT Platform for the New Enterprise

by DellSep 23, 2020

The edge is real. Only a year ago, edge computing may have been viewed as amorphous, something between distributed computing and the cloud. Today, it?s clear that the ?edge? isn?t just about technology but is a core strategy enterprise need to consider. The edge is about processing data where it makes sense and minimizing the burden on the enterprise network. This special report and webinar will highlight the potential benefits from edge and how enterprises can approach it.