Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

3 Things You Need to Know About Prioritizing Vulnerabilities

by TenableAug 19, 2019

91% of organizations had one cyberattack in the last 2 years. Learn how Predictive Prioritization can help you.

  • Tenable
  • Cloud Security
  • Network & Perimeter Security
  • Details

What’s the Answer to the Vulnerability Overload Problem? Key Findings from ESG’s Cyber Risk Management Survey

by TenableAug 19, 2019

ESG survey confirms why a new approach to prioritizing vulnerabilities is badly needed. Learn about key findings.

  • Tenable
  • Cybersecurity
  • Network & Perimeter Security
  • Details

How to Prioritize Cybersecurity Risks: A Primer for CISOs

by TenableAug 19, 2019

Security leaders know they can't find and fix every vulnerability. Take a risk-based approach to prioritization.

  • Tenable
  • Cybersecurity
  • Network & Perimeter Security
  • Details

Gartner: A Guide to Choosing a Vulnerability Assessment Solution, 2019

by TenableAug 19, 2019

By 2022, organizations that use the risk-based VM method will suffer 80% fewer breaches. Get guidance from Gartner.

  • Tenable
  • Cybersecurity
  • Security
  • Details

SANS 2019 Incident Response (IR) Survey: It's Time for a Change

by ExtraHopAug 14, 2019

Curious about the state of incident response worldwide? Interested in expert recommendations for improving your incident team's performance?

In this report, you'll dive deeper into survey results and get suggestions on how to boost breach detection, investigation and remediation by focusing on:

• Eliminating gaps in visibility
• Automating responses to security threats
• Improving communication between SecOps and NetOps teams

  • ExtraHop
  • Risk Management
  • Security Management & Analytics
  • Details

EMA 2019 Report: Bridging the Gap Between NetOps and SecOps

by ExtraHopAug 14, 2019

Security incidents often present themselves as performance problems, and IT teams that respond to security incidents as performance issues will miss opportunities to protect the business from attack.

Today's enterprises recognize that network operations and security operations teams should be partners, not adversaries--but especially in large, well-established organizations, that kind of cultural and process shift is much easier said than done.

In this whitepaper, Enterprise

  • ExtraHop
  • Network & Perimeter Security
  • Security Monitoring
  • Details

DDoS Resilience, Remediation and Recovery: Updating Your Strategy

by NeuStar, Inc.Aug 13, 2019

Most organizations keep back-ups and have basic plans to protect themselves from denial of service attacks. However, most of those DDoS response strategies were long before businesses relied upon cloud services for fundamental operations, before our environments were full of IoT devices requiring network access, and long before the threat of IoT botnets. We are more reliant than ever on network access, and attackers have more powerful tools than ever to cut that access off. So are you ready for


2019 Stats Report: The DevSecOps Approach

by WhiteHat SecurityAug 13, 2019

WhiteHat Security is now a wholly-owned, independent subsidiary of NTT Security. With this strategic development, we are able to combine the global reach of NTT with WhiteHat's deep expertise in application security. As a result, our research now offers the most comprehensive perspective on the current state of application security, as well as recommendations on how to implement DevSecOps effectively.

The 2019 WhiteHat Application Security Statistics report looks at our underlying

  • Whitehat Security
  • Cybersecurity
  • Security Monitoring
  • Details

TitaniumCloud File Intelligence vs. VirusTotal

by ReversingLabsAug 09, 2019

Security teams have a choice! ReversingLabs offers unequalled file intelligence with more total and more current data along with complete query/post privacy and enterprise class support. ReversingLabs also offers an option VirusTotal cannot — a complete onsite malware analysis solution that combines the industry's authoritative file intelligence database with an on-premises malware analysis and threat hunting platform. If your security team is tired of struggling with the limitations of

  • ReversingLabs
  • Cloud Security
  • Security Monitoring
  • Details

The New Threat Intelligence — How Automated Static Analysis Finds the Destructive Objects Existing Solutions Miss

by ReversingLabsAug 09, 2019

Malware continues to increase in sophistication and routinely evades organizations' cyber defenses. It lurks inside networks, often for months, executing or waiting to execute attacks that can cause significant damage. Even though the industry has developed various technologies to bolster detection and response, the situation persists. The 2019 Verizon Data Breach Report results show that the discovery of successful attacks is still measured in months and containment in weeks, meaning average

  • ReversingLabs
  • Cybersecurity
  • Database Security
  • Details