Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Dark Reading - Check out Our Newsletters

by Dark ReadingJun 24, 2019

Subscribe to the Dark Reading newsletters and get your daily/weekly dose of news, analysis, and glimpse into the chaos and mystery of network and data security.

  • Dark Reading
  • Security
  • Security Monitoring
  • Mobile security
  • Endpoint Security
  • Security Management & Analytics
  • Risk Management/Security
  • Cybersecurity
  • Network & Perimeter Security
  • Cloud Security
  • Database Security
  • Security platforms
  • Details

The Uncalculated Costs of Managing Your Own Security Infrastructure

by BlueVoyantJun 24, 2019

Most organizations eventually outgrow their one or two-person security analyst team as the security monitoring requirements of the business grows beyond what the team can handle. As is often said by understaffed organizations, "that's a good problem to have". Many businesses cannot afford a full-time, or even part-time, security resource to manage the security concerns of the business. When a business reaches this stage in their security journey, one phrase often materializes: "We should build

  • BlueVoyant
  • Security Management & Analytics
  • Security platforms
  • Details

Ransomeware: To Pay or Not To Pay?

by BlueVoyantJun 24, 2019

Ransomware attacks continue to be a serious threat to businesses. Cybercriminals have used ransomware to facilitate a commoditized business model by targeting small to medium enterprise organizations that lack the resources to adequately protect themselves. Download this whitepaper to learn how to protect your business!

  • BlueVoyant
  • Security Monitoring
  • Security Management & Analytics
  • Details

TrickBot/Gozi Malware Case Study: Online Processing

by BlueVoyantJun 24, 2019

Online Travel Agencies (OTA) have taken over the hospitality industry, and in their rush to move online many neglected focusing attention on crucial security measures. Download this case study to read about a West Coast-based OTA worked with BlueVoyant to respond, identify the malware, and remediate an attack resulting in almost $1 million in losses.

  • BlueVoyant
  • Security Monitoring
  • Risk Management/Security
  • Details

Emotet Malware Case Study

by BlueVoyantJun 24, 2019

Municipalities responsible for both large and small communities are often a target of cyber attackers because they are networked to key infrastructure and transmit sensitive financial data. Download this case study to learn how BlueVoyant identified and remediated an email-based phishing campaign giving the cyber attacker access to over 1,400 emails points.

  • BlueVoyant
  • Security Monitoring
  • Risk Management/Security
  • Details

7 Experts Discuss Evaluating MSSPs

by BlueVoyantJun 24, 2019

As cyber threats and the solutions employed to address them become more challenging, businesses are increasingly turning to managed security service providers (MSSPs) for help. Doing so makes a lot of sense, because cyber security is not the core competency of most businesses. However, it is the business of MSSPs, and good MSSPs maintain the staff, expertise, and technologies needed to always stay on top of the latest cyber threats. But what is a good MSSP? The first step in determining the

  • BlueVoyant
  • Security platforms
  • Security Management & Analytics
  • Details

Testing for Compliance Just Became Easier

by CymulateJun 21, 2019

Compliance has long been a fact of life for IT and security teams.

  • Cymulate
  • Cybersecurity
  • Risk Management/Security
  • Details

Telit Challenges Security Controls with Cymulate’s Breach & Attack Simulation

by CymulateJun 21, 2019

Telit Challenges Security Controls with Cymulate's Breach & Attack Simulation

  • Cymulate
  • Cybersecurity
  • Risk Management/Security
  • Details

The Essential Guide to Security

by SplunkJun 20, 2019

Learn how machine data can solve common security use cases and how to get started with the Splunk platform.

  • Splunk
  • Security Monitoring
  • Endpoint Security
  • Details

The Five Essential Capabilities of an Analytics-Driven SOC

by SplunkJun 20, 2019

Due to recent cyberattacks, security operations centers (SOCs) have had to focus on a holistic and cohesive security strategy by consolidating the right people, processes and technology to mitigate and remediate attacks.This white paper dives into the necessity of SOCs to be analytics driven and how it helps IT and business leaders assess their own risk levels.

  • Splunk
  • Cybersecurity
  • Security
  • Details