Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

How to Prevent 81% of Phishing Attacks from Sailing Right into Your Inbox with DMARC

by KnowBe4, Inc.Dec 10, 2019

Only ~20% of companies use DMARC, SPF, and DKIM, global anti-domain-spoofing standards, which could significantly cut down on phishing attacks. But even when they are enabled and your domain is more secure, 81% of phishing attacks still continue to sail right through to the end-user. In this webinar, Roger Grimes, KnowBe4?s Data-Driven Defense Evangelist, will teach you how to enable DMARC, SPF, DKIM the right way! Then, learn the six reasons why phishing still might get through to your inbox


Splunk Security Predictions 2020

by SplunkDec 10, 2019

In IT Security, we're lucky to stay one step ahead of the bad guys. To give you a half-step more advantage, a panel of Splunk IT security experts has assembled a fresh look at emerging threats - and one major emerging solution.

  • Splunk
  • Security
  • Security Monitoring
  • Details

The Cloud Gets Ready for the 20's

by InformationWeekDec 06, 2019

This IT Trend Report explores how cloud computing is being shaped for the next phase in its maturation. It will help enterprise IT decision makers and business leaders understand some of the key trends reflected emerging cloud concepts and technologies, and in enterprise cloud usage patterns. Key themes include managing multi-cloud and hybrid cloud environments and lessons learned from a four-year project to migrate a major bank from on-premise systems to a new cloud environment.

Here's

  • InformationWeek
  • Cloud
  • Data centers
  • Infrastructure as a Service
  • Software as a Service
  • Cloud Services
  • Platform as a Service
  • Details

Simplify Your Application Security

by WhiteHat SecurityDec 06, 2019

Aimed at helping you simplify your company's application security; this whitepaper offers recommendations to combat some of the most common application security issues experienced by organizations today.

  • Whitehat Security
  • Security Management & Analytics
  • Endpoint Security
  • Details

Cloud Sprawl: It’s Worse Than You Think

by Expanse, Inc.Dec 05, 2019

Organizations today are blind to how many assets they have in the cloud. Many assume they're only in the three major cloud providers (Amazon Web Services (AWS), Google Cloud Platform, and Microsoft Azure). But in practice, most organizations are in ten or more providers. And if you don?t know about all of your cloud instances, you can?t secure them appropriately. Join us on December 5th to learn how to get complete visibility into your cloud infrastructure with the Expanse Internet


Guide to Building Your Vendor Risk Management Program

by SecurityScorecardDec 05, 2019

Tackling the problem of vendor risk is not made any easier with technology solutions being added by the day. Current vendor risk management processes are not equipped to handle the growing demand ofsecurity risk assessmentsfor new and existing third-parties. Download the guide to learn how you can improve yourvendor risk management programto handle the modern risk that lies ahead.

  • SecurityScorecard
  • Risk Management/Security
  • Risk Management
  • Details

Case Study: Modulr

by SecurityScorecardDec 05, 2019

By using SecurityScorecard, Modulr Finance was also able to decrease operational costs, increase objectivity, reduce human error and more. Read the case study.

  • SecurityScorecard
  • Risk Management/Security
  • Risk Management
  • Details

Case Study: Horizon Media

by SecurityScorecardDec 05, 2019

Learn how Horizon Media used SecurityScorecard to make strategic changes to their IT infrastructure and increase cybersecurity hygiene. Read more.

  • SecurityScorecard
  • Risk Management/Security
  • Risk Management
  • Details

Assessing Exposure and Organizational Behavior to the BlueKeep Vulnerability

by SecurityScorecardDec 05, 2019

SecurityScorecard researchers used the BlueKeep event as a way to study organizations' response to this vulnerability over time. Read the report.

  • SecurityScorecard
  • Risk Management/Security
  • Risk Management
  • Details

Gartner's Top 10 Security Projects for 2019 Report

by SecurityScorecardDec 05, 2019

Get your copy of Gartner's Top 10 Security Projects for 2019 report to find out which projects you should implement or improve upon in 2019. Learn more.

  • SecurityScorecard
  • Risk Management/Security
  • Risk Management
  • Details