Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

2019 State of IT Infrastructure

by InformationWeekJun 17, 2019

Modern businesses depend on technology that moves fast, and IT organizations are moving away from legacy architectures to a new breed of software-defined, cloud-based, and open source infrastructure to meet the demands. This research will examine the current state of enterprise data center, storage and network infrastructure, explore how it is evolving, and look into future plans for implementation. The information submitted is collected by both Informa and our sponsor. Click

  • InformationWeek
  • Infrastructure
  • Data centers
  • Cloud Infrastructure
  • Details

Q1 2019 Quarterly Threat Report

by eSentireJun 14, 2019

Read this report to learn what targeted businesses in January, February and March 2019 and to find out what strategies you can implement to protect your organization.

  • eSentire
  • Cybersecurity
  • Endpoint Security
  • Risk Management/Security
  • Details

Automating Cybersecurity Functions in Your Enterprise

by SecureWorksJun 12, 2019

Organizations face tremendous challenges when trying to keep pace with the volume of cyber incidents they are seeing today. Information security leaders are looking to the benefits of security orchestration and automation to relieve the strain on their incident response teams. While the promise of orchestration is great, achieving success requires great care in choosing which processes and investigative actions to automate.

  • Security Management & Analytics
  • Details

Network Traffic Analysis for MITRE ATT&CK

by ExtraHopJun 12, 2019

The MITRE ATT&CK Framework has rapidly become popular among security teams looking to take a structured and proactive approach to improving threat detection.

For many security professionals, using the ATT&CK Framework means taking a close look at each of the hundreds of tactics, techniques, and procedures (TTPs) and trying to figure out which tool in their patchwork of solutions is most likely to detect or block any given threat. MITRE provides an evaluation framework for Endpoint

  • ExtraHop
  • Security Management & Analytics
  • Endpoint Security
  • Security platforms
  • Details

Understanding Container Adoption With a Special Focus on Container Security

by Aqua Security Software Inc.Jun 12, 2019

This 2019 Container Adoption Survey reveals key trends and drivers of container adoption from over 500 IT pros surveyed.

  • Aqua Security Software Inc.
  • Cloud Security
  • Security
  • Details

451 Business Impact Brief: Security for Cloud-Native Compute Will Be Different

by Aqua Security Software Inc.Jun 12, 2019

The impact on security will be significant. This 451 Business Impact Report explains the requirements of cloud native security and why organizations should approach it differently.

  • Aqua Security Software Inc.
  • Cloud Security
  • Security
  • Details

The 2019 Trust Report

by SynackJun 11, 2019

In today's world, consumers are demanding trust from the products that they love, and security has become a core piece of providing consistent, positive customer experience.

That's why today, Synack, the trusted crowdsourced security platform, has released the first annual Trust Report, Volume I: Trust Has a Number. In the report, security, brand and policy executives from Home Depot, Intel, CLEAR, Just Eat, and Stanford share how they are defending their brands and building stronger

  • Synack
  • Cybersecurity
  • Security platforms
  • Details

Santander Case Study

by SynackJun 11, 2019

Learn why Santander Chose Scalable, Crowdsourced Security Testing to Protect their Customer Assets Santander UK needed a more comprehensive and efficient way to protect its changing attack surface. Leveraging the power of Synack's crowdsourced security testing platform, Santander got this and more. "To put it simply, my goal as CISO has always been to make Santander a safer place for our customers to bank." - Dave Sheridan, CISO, UK Santander

Learn how Santander achieved:

  • Synack
  • Cybersecurity
  • Security platforms
  • Details

Essential Elements of a Penetration Test

by SynackJun 11, 2019

The Essential Elements of a Penetration Test, a guide based on expert analysis and our experience with the largest brands across the G2000, shares what we've learned from protecting >$1 trillion in Fortune 500 revenue.

It is estimated that up to $5.2 trillion in global value is at risk of cybercrime over the next five years. To protect themselves from being hacked and in response to increased compliance and regulations, organizations have traditionally performed penetration testing

  • Synack
  • Cybersecurity
  • Security platforms
  • Details

Thinking Like a Cyber Attacker: Strategies for Defense

by VeracodeJun 06, 2019

Increasingly, enterprises are discovering that the best way to test and defend their organization is to view their IT environment from the perspective of an attacker. But how do you predict an attacker's motives and simulate their methods, and how do you know that you aren?t overlooking key vulnerabilities? In this Dark Reading webinar, experts discuss methods for testing your security?s mettle by thinking like your adversary.