Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Cyber AI & Darktrace Cloud

by DarktraceJun 18, 2019

The rapid adoption of cloud and SaaS services has transformed the digital business and fundamentally reshaped the challenge of defending the enterprise against advanced attacks.

This trend presents a special challenge for strained security teams, who must now cope with an environment where they have limited visibility and control, and where their familiar on-premise security tools are often not applicable.

Most organizations recognize this reality but few, if any, are

  • Darktrace
  • Cybersecurity
  • Cloud Security
  • Details

Darktrace Antigena: The Future of AI-Powered Autonomous Response

by DarktraceJun 18, 2019

The current era in cyber security is characterized by three fundamental challenges: the complexity of the enterprise network and connected infrastructure, the speed of newage attacks, and the strain of overwhelmed incident responders.

This white paper will explore the critical challenges that security teams face in this new era of cyber-threat, and how Darktrace Antigena is leveraging AI to autonomously fight back against advanced attacks, giving human responders the critical time

  • Darktrace
  • Cybersecurity
  • Risk Management/Security
  • Details

Machine Learning in the Age of Cyber AI

by DarktraceJun 18, 2019

A new era in cyber security has begun. In today's complex digital environments, machines are fighting machines, and advanced attackers and criminal groups are contriving sophisticated new ways to perpetrate their missions. The corporate network has become a battlefield. where the stakes are control of digital assets and, ultimately, the ability of the organization to function.

This white paper explains Darktrace's approach to machine learning and shines a light on the world's leading

  • Darktrace
  • Cybersecurity
  • Security Monitoring
  • Details

Cyber AI Response: Threat Report 2019

by DarktraceJun 18, 2019

This report details seven case studies of attacks that were intercepted and neutralized by cyber defense AI, including insider threat, ransomware, and IoT attacks.

While all threat scenarios were distinct, some fast-moving and others slow and stealthy, in all cases the subtle indicators of suspicious activity were only detectable using Darktrace AI, which learns what is normal for the business environment and autonomously responds to attacks - before damage is done.

  • Darktrace
  • Cybersecurity
  • Risk Management/Security
  • Details

2019 State of IT Infrastructure

by Network ComputingJun 17, 2019

Modern businesses depend on technology that moves fast, and IT organizations are moving away from legacy architectures to a new breed of software-defined, cloud-based, and open source infrastructure to meet the demands. This research will examine the current state of enterprise data center, storage and network infrastructure, explore how it is evolving, and look into future plans for implementation. The information submitted is collected by both Informa and our sponsor. Click

  • Infrastructure
  • Data centers
  • Cloud Infrastructure
  • Network Computing
  • Details

Q1 2019 Quarterly Threat Report

by eSentireJun 14, 2019

Read this report to learn what targeted businesses in January, February and March 2019 and to find out what strategies you can implement to protect your organization.

  • eSentire
  • Cybersecurity
  • Endpoint Security
  • Risk Management/Security
  • Details

Automating Cybersecurity Functions in Your Enterprise

by SecureWorksJun 12, 2019

Organizations face tremendous challenges when trying to keep pace with the volume of cyber incidents they are seeing today. Information security leaders are looking to the benefits of security orchestration and automation to relieve the strain on their incident response teams. While the promise of orchestration is great, achieving success requires great care in choosing which processes and investigative actions to automate.

  • Security Management & Analytics
  • Details

Network Traffic Analysis for MITRE ATT&CK

by ExtraHopJun 12, 2019

The MITRE ATT&CK Framework has rapidly become popular among security teams looking to take a structured and proactive approach to improving threat detection.

For many security professionals, using the ATT&CK Framework means taking a close look at each of the hundreds of tactics, techniques, and procedures (TTPs) and trying to figure out which tool in their patchwork of solutions is most likely to detect or block any given threat. MITRE provides an evaluation framework for Endpoint

  • ExtraHop
  • Security Management & Analytics
  • Endpoint Security
  • Security platforms
  • Details

Understanding Container Adoption With a Special Focus on Container Security

by Aqua Security Software Inc.Jun 12, 2019

This 2019 Container Adoption Survey reveals key trends and drivers of container adoption from over 500 IT pros surveyed.

  • Aqua Security Software Inc.
  • Cloud Security
  • Security
  • Details

451 Business Impact Brief: Security for Cloud-Native Compute Will Be Different

by Aqua Security Software Inc.Jun 12, 2019

The impact on security will be significant. This 451 Business Impact Report explains the requirements of cloud native security and why organizations should approach it differently.

  • Aqua Security Software Inc.
  • Cloud Security
  • Security
  • Details