Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

title

by IBMMay 22, 2020

Virtual eventsare growing in popularity, especially as the world continues to deal with the novel coronavirus. Fortunately, modern technology has made it possible for companies to host amazing online events that rival in-person versions, leading to many benefits for both event planners and attendees alike. In this article, we take a deep dive into what virtual events are and why they're worth your time. Then we share 20 unique ideas you can use to host an amazing virtual event today. For more


Assess your Security Effectiveness

by CyCognitoMay 22, 2020

Conducting an organizational self-assessment of the strengths and weaknesses of your cybersecurity program is a critical process that should be an ongoing activity for every organization.

By establishing a baseline security evaluation of your cybersecurity effectiveness, you can measure your progress over time and implement plans to better align your program to your business priorities. This helps you improve your security program and ensure that investments in people and technology

  • CyCognito
  • Security Management & Analytics
  • Risk Management
  • Details

The State of IT and Cybersecurity Operations

by ExtraHopMay 20, 2020

As companies tighten their belts, the need for coordination between IT and Cybersecurity Operations has never been more urgent. Now is the time to align organizational priorities and budgets. Dark Reading recently took a measure of the relationship between IT and Security teams. Join us as we discuss the survey, share it's findings and review best practices for CIOs and other leadership roles.


E911 Support for Microsoft Teams in the Enterprise and Beyond

by Intrado IncMay 20, 2020

Enterprise communications are rapidly evolving towards Unified Communications (UC) technologies, especially in a time when remote working is significantly on the rise. With Microsoft Teams trumping the list of collaboration platforms, enterprises are seeing the immediate benefits of moving their communications deployments to the cloud while users take advantage of the wide range of UC capabilities, including Microsoft?s latest Dynamic E911 feature. One of the most important functionalities,


Mandiant Security Effectiveness Report 2020

by MandiantMay 15, 2020

The Mandiant Security Effectiveness Report 2020 explores cyber security performance across enterprise production environments and reveals how well organizations are protecting themselves against cyber threats.

Download the report to learn: Why a majority of tested attacks successfully infiltrate enterprise environments without detection The fundamentals of security validation and why it's so critical How to improve the effectiveness of security controls

  • Mandiant
  • Security Monitoring
  • Security platforms
  • Details

Automate Testing Using MITRE ATT&CK® with Verodin Security Validation

by MandiantMay 15, 2020

Organizations are increasingly adopting MITRE ATT&CK® as a foundational element to their security programs. The Automate Testing Using MITRE ATT&CK® with Verodin paper provides organizations with a clear understanding of how security validation technology enables organizations to automate their ATT&CK-based effectiveness programs to optimize their defenses.

The white paper covers: The challenges of ATT&CK tactical implementation Emulation vs simulation Behavioral testing

  • Mandiant
  • Security Monitoring
  • Security Management & Analytics
  • Details

SANS 2020 Top New Attacks and Threat Report

by MandiantMay 15, 2020

In this paper, SANS Director of Emerging Security Trends John Pescatore highlights key themes from analysis of new attack techniques presented by SANS at the RSA 2020 Conference.

The paper includes: An overview of the top new attacks and threats Insight into overall cybersecurity trends on both the offensive and defensive sides Advice on the steps enterprises must take to evolve critical skills, processes and controls to mitigate current and future risks

  • Mandiant
  • Cybersecurity
  • Security Monitoring
  • Details

Case Study: Continuously Validate Cybersecurity Controls

by MandiantMay 15, 2020

Are you able to get evidence-based data to show progress and improvements in your cybersecurity strategy?

Read this case study to understand how Mandiant Security Validation (formerly Verodin), empowers leading financial services organization Torchmark Corporation to continuously validate cybersecurity controls and realize improvements in key areas such as: People and process conditioning Communicating the effectiveness of security controls Real-time insights into environmental drift

  • Mandiant
  • Risk Management/Security
  • Security Monitoring
  • Details

CyberSecurity Trends 2020

by MandiantMay 15, 2020

Without ongoing validation that security solutions are working as promised, businesses can be caught off-guard when an attempted hack is successful, and the financial impact and cost to brand reputation can be highly disruptive and long-lasting.

Read the Verodin Cybersecurity Trends 2020 eBook, to understand the four key trends that will shape how users and vendors of security technology approach the evolving threat landscape.

  • Mandiant
  • Cybersecurity
  • Security Monitoring
  • Details

The Future of the Security Operations Center (SOC)

by Palo Alto NetworksMay 13, 2020

Today's security operations centers (SOCs) are helping enterprises to defend critical data and initiate security incident response. But most experts agree that today?s SOCs will evolve radically in the near future, as technologies such as orchestration, machine learning, artificial intelligence, and security automation become more tightly integrated into SOC processes. In this webinar, top experts will discuss the long-term evolution of SOC technology, staffing, and processes, and how your