Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

State of Cybersecurity Incident Response

by Dark ReadingFeb 27, 2020

Every day, enterprises wrestle with cybersecurity compromises of all sizes and types, ranging from simple viruses to complex, targeted online attacks. To successfully defend their data, IT organizations are developing teams, tools, and processes to quickly respond to new cyber threats and compromises--but not all of them are succeeding. In this Dark Reading Report, "How Enterprises Respond to the Incident Response Challenge," we find out how enterprises are building their incident response teams

  • Dark Reading
  • Cybersecurity
  • Security Management & Analytics
  • Details

Global Application and Network Security Report

by RadwareFeb 27, 2020

How do you protect against threats you can't see? Businesses demand innovation, but faster time to market for new applications and services creates blind spots where security vulnerabilities are lurking.

This 9th annual security report provides a comprehensive review of:

• The threat landscape and the business impact of 2019's cyber-attacks
• Security of multiple cloud environments
• Agile security for DevOps and Microservices
• Security considerations

  • Radware
  • Security Management & Analytics
  • Cybersecurity
  • Details

Hacker's Almanac

by RadwareFeb 27, 2020

The threat landscape is as diverse as it is sophisticated, thanks largely to the fact that the skills and tools behind launching cyberattacks have become commoditized. As a result, hackers and cyberciminals have reached a level of maturity and efficiency unsurpassed in the history of cyberwarfare, resulting in a dramatic increase in attack frequency, complexity and size.

Although these threats constitute a clear and present danger to organizations worldwide, knowledge is power. Download

  • Radware
  • Security Monitoring
  • Cybersecurity
  • Details

Anatomy of a Cloud-Native Data Breach

by RadwareFeb 27, 2020

Migrating computing resources to cloud environments opens up new attack surfaces previously unknown in the world of premise-based data centers. As a result, cloud-native data breaches frequently have different characteristics and follow and different progression than physical data breaches. Download this whitepaper to review a real-life example of a cloud-native data breach, how it evolved and how it possibly could have been avoided.

  • Radware
  • Network & Perimeter Security
  • Security Monitoring
  • Details

The Top Automated Bot Threats and How to Stop Them

by RadwareFeb 27, 2020

"Bad" bots, which masquerade as humans and attack online businesses, now comprise 26% of total internet traffic. They evade conventional security technologies, threatening websites, mobile applications and even APIs. Often, these highly sophisticated and automated threats set their sights on web applications, using an array of tactics to pillage personal data, tie down online inventory and degrade application/website performance.

These attacks often go undetected by conventional

  • Radware
  • Security Management & Analytics
  • Cybersecurity
  • Details

Top 9 DDoS Threats Your Organization Must Be Prepared For

by RadwareFeb 27, 2020

Data centers now span the boundaries of both the on-premise and cloud universe. How do you keep them secure as the IoT landscape expands and more destructive threats are inevitable? Which security model best fits your organization? Read this guide to understand the top things to look for in DDoS protection.

  • Radware
  • Security Management & Analytics
  • Network & Perimeter Security
  • Details

Why Your Contact Center Should Be Migrating to the Cloud

by GenesysFeb 26, 2020

Migrating to a cloud contact center solution enables your company to continuously provide meaningful experiences while delivering competitive results. Cloud solutions allow you to get automated, get predictive with your customers? needs and, more importantly, allow you to have a dynamic contact center that can help your company stay competitive. Join Robin Gareiss, Founder and President of Nemertes Research, and Derek Adams, Senior Product Marketing Director at Genesys, to learn more about why


Finding an Access Solution

by LogMeInFeb 24, 2020

So, you've decided your business could benefit from an access solution. Now what? To help, we've crafted a comprehensive guide to walk you through evaluating and comparing access solutions. Download the free guide to learn: Core components of an effective access solution Key problems an access solution should address A comprehensive set of criteria for evaluating solutions Best practices for implementing an access solution

  • LogMeIn
  • Cybersecurity
  • SMB Security
  • Details

Identity 101 for Businesses

by LogMeInFeb 24, 2020

What is identity, and what do you need to know about investing in a solution? To help, we've crafted an introductory guide to explain key concepts around identity and access management, so you can feel more confident when you're ready to explore or trial an identity solution.
Download the free guide to learn: why identity matters How an identity solution addresses key challenges The benefits you can expect from an identity solution Overviews of Single Sign-On, Enterprise Password

  • LogMeIn
  • SMB Security
  • Cybersecurity
  • Details

Global Password Security Report

by LogMeInFeb 24, 2020

LastPass has analyzed over 47,000 businesses to bring you insights into security behavior worldwide. The takeaway is clear: Use of important security measures like multifactor authentication is up, but the continued reality of poor password hygiene still hampers many business' ability to achieve high standards of security. Download the free report today to see the current state of password security, access, and authentication — and learn what you can do today to better secure your company.

  • LogMeIn
  • Cybersecurity
  • SMB Security
  • Details