Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Building an Application Security Strategy For the Next Decade

by Micro FocusJan 21, 2021

For many years, enterprises built their application security strategies around vulnerability scanning and next-generation firewalls. But with the advent of DevOps, ShiftLeft, and many other application development tools and strategies, yesterday?s strategies will no longer work for the enterprises of the 2020s. In this webinar, experts offer a look at emerging technologies and trends in application development, and the role that security will play in tomorrow?s software development


2020 End of Year Phishing Report

by INKYJan 21, 2021

Now that 2020 has closed out, we can safely say it was a banner year for the phishing industry. In some ways, the environment was perfect for nurturing phishing attacks: people were isolated by COVID-19 for much of the year, and they were dealing with unfamiliar situations, fear, and uncertainty. And they were more reliant than ever upon the infrastructure of the internet. Download this report to learn more.

  • INKY
  • Security Monitoring
  • Cybersecurity
  • Details

Special Report: Pandemic Phish Are Attacking Without Conscience

by INKYJan 21, 2021

The latest wave of pandemic phishing emails is more sophisticated than ever. Bad actors have recently been capitalizing on Americans' hope for Coronavirus financial assistance by impersonating U.S. federal government in two separate phishing emails. Learn more about it in this report that hones in on this type of phishing attack.

  • INKY
  • Security Monitoring
  • Cybersecurity
  • Details

Understanding Phishing: Account Takeover

by INKYJan 21, 2021

One of the most pernicious forms of phishing involves account takeover. In these attacks a bad actor harvests, guesses, or brute-force the password for an email account, and then uses this account to impersonate a person or brand... often with devastating results.

  • INKY
  • Security Monitoring
  • Cybersecurity
  • Details

Stopping Phishing Attacks: Closing the Mobile-Gap

by INKYJan 21, 2021

Mobile devices have become a critical tools for the modern worker, utilizing email as a core communications mechanism to engage in business activity. However, most mobile devices lack many of the most basic security controls provided in desktop email clients, making mobile devices more prone to successful email phishing attacks. When evaluating email security solutions, organizations should prioritize capabilities that can overcome these inherent limitations, leading to phishing protection on

  • INKY
  • Security Monitoring
  • Cybersecurity
  • Details

The Trouble with Phishing

by Duo SecurityJan 20, 2021

Phishing is one of the most common threats hitting organizations, because it often targets our most vulnerable interests. It leads to credential theft, unauthorized access to sensitive systems, and data breaches of confidential information. This guide by Duo Security details the problems around phishing, how it works, and what you can do about it.

  • Security Monitoring
  • Security Management & Analytics
  • Duo Security
  • Details

The Essential Guide to Securing Remote Access

by Duo SecurityJan 20, 2021

The recent massive shift to remove work can introduce new security threats and challenges to organizations. Stolen passwords, phishing scams and exploited known vulnerabilities targeting your users, their out-of-date devices, cloud applications and software can all be cause for unwanted hacks. This guide covers different remote security threats and security best practice recommendations to help your organization protect against a data breach.

  • Cisco Duo
  • Network & Perimeter Security
  • Security Management & Analytics
  • Duo Security
  • Details

Five Reasons to Protect your VPN with Multi-Factor Authentication

by Duo SecurityJan 20, 2021

Virtual private networks (VPNs) are a tried and true method for providing remote access to internal applications. However, they aren't the end-all-be-all for secure access for off-site users to connect to your organization's applications. Multi-factor authentication (MFA) can provide an additional layer of protection, and Duo Security's guide outlines five reasons why securing your VPN with MFA to ensure trusted access is a good idea.

  • Duo Security
  • Network & Perimeter Security
  • Security Management & Analytics
  • Details

Microsoft Teams Direct Routing

by Enterprise ConnectJan 20, 2021

Microsoft Teams is gaining high acceptance in enterprises across all sizes and vertical industries. But turning acceptance into effective implementation and productive user adoption may not always be straightforward. To help enterprise IT/communications professionals get the most out of their Microsoft Teams implementations, Enterprise Connect will present a series of information-filled programs to provide detailed advice and real-world strategies and tactics as enterprises roll out Microsoft


A Radical Approach to Threat Intel Management

by Palo Alto Networks, Inc.Jan 20, 2021

For years, cyber threat intelligence has been focused on collecting tactical Indicators of Compromise (IOCs) such as domains, IP addresses, & hashes. But what's the point of collecting tactical information that your team can't act on or map to what's happening in your environment? As a security leader, you need more from your cyber threat intelligence program.