Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Building an Effective Cybersecurity Incident Response Team

by Dark ReadingSep 28, 2020

Today's enterprises are under attack. Whether it's malware, ransomware, social engineering, or targeted exploits, security teams must be ready to detect these cyber attacks, analyze the threat, and launch a quick and effective response. Is your organization ready?

There are a wide variety of IT security tools available for cyber incident response. But most organizations have discovered that it's people — the analysts and technicians who make up the cyber response team —

  • Dark Reading
  • Cybersecurity
  • Security Management & Analytics
  • Details

Get Your Security Tools Talking for More Effective Incident Response

by SwimlaneSep 24, 2020

How your team responds to an incident has a tremendous impact on the outcome. But with the average organization using dozens upon dozens of security tools, each with its own alerts, interfaces, and logins, it can be tough to respond to incidents quickly. How do you manage a well-orchestrated, repeatable and effective incident response in the midst of tool chaos and a changing threat landscape? Join this webinar with Jake Gillen, SOAR Engineer, and Julie Rockett, Senior Product Marketing Manager,


Get Your Security Tools Talking for More Effective Incident Response

by SwimlaneSep 24, 2020

How your team responds to an incident has a tremendous impact on the outcome. But with the average organization using dozens upon dozens of security tools, each with its own alerts, interfaces, and logins, it can be tough to respond to incidents quickly. How do you manage a well-orchestrated, repeatable and effective incident response in the midst of tool chaos and a changing threat landscape? Join this webinar with Jake Gillen, SOAR Engineer, and Julie Rockett, Senior Product Marketing Manager,


Aligning Cyber Skills to the MITRE ATT&CK Framework

by Immersive LabsSep 24, 2020

In order to keep pace with hackers, you need to learn like hackers. That's why when it comes to guidance on building detection and response programs, MITRE ATT&CK® — which has a strong adversarial focus — trumps traditional frameworks such as the Diamond Model (which lacks technical depth), and Lockheed Martin's Cyber Kill Chain (which offers little from the attacker's perspective).

So, how can you maximize MITRE ATT&CK framework to bolster your cyber skills strategy?

  • Security Management & Analytics
  • Network & Perimeter Security
  • Details

The Ultimate Cyber Skills Strategy Cheat Sheet

by Immersive LabsSep 24, 2020

No one needs more stats about the skills gap in cybersecurity; many organizations are obviously facing challenges in recruiting, skilling, and retaining security professionals. This cheat sheet wasn't created to tell you what you already know. Instead, it outlines a realistic strategy for workforce-wide cyber skills development, focusing on the solution, not just the problem.

• The state of cybersecurity skills
• Debunking the cybersecurity myths
• The power in

  • Immersive Labs
  • Cybersecurity
  • Security Management & Analytics
  • Details

Osterman Research: Cyber Crisis Response - Fit For Today's Threat Landscape?

by Immersive LabsSep 24, 2020

Cyber crisis response and preparedness is on everyone's lips, yet organizations' efforts are failing to adapt to modern threats. While table top exercises have long been considered an essential tool in preparing organizations to face cyber crises, they're now rapidly falling into obsolescence.

So what's the alternative? How many organizations still rely on PowerPoint-driven table exercises to bolster their incident response plans? Is this legacy method of defining cyber crisis

  • Immersive Labs
  • Cybersecurity
  • Security Management & Analytics
  • Details

Edge Computing: An IT Platform for the New Enterprise

by DellSep 23, 2020

The edge is real. Only a year ago, edge computing may have been viewed as amorphous, something between distributed computing and the cloud. Today, it?s clear that the ?edge? isn?t just about technology but is a core strategy enterprise need to consider. The edge is about processing data where it makes sense and minimizing the burden on the enterprise network. This special report and webinar will highlight the potential benefits from edge and how enterprises can approach it.


Edge Computing: An IT Platform for the New Enterprise

by DellSep 23, 2020

The edge is real. Only a year ago, edge computing may have been viewed as amorphous, something between distributed computing and the cloud. Today, it?s clear that the ?edge? isn?t just about technology but is a core strategy enterprise need to consider. The edge is about processing data where it makes sense and minimizing the burden on the enterprise network. This special report and webinar will highlight the potential benefits from edge and how enterprises can approach it.


Microsoft Teams Phone System – Getting Connected with Direct Routing

by Ribbon Communications Inc.Sep 23, 2020

IT managers and CIOs suddenly have a user community that is ready to make and receive business phone calls with Microsoft Teams. Direct Routing allows those adopting Microsoft Teams Phone System to use their own session border controller and SIP trunking provider. This approach offers the potential to reduce costs, improve flexibility, and ensure a seamless, minimally disruptive migration to Teams. Successfully implementing Direct Routing requires an understanding of licensing options,


2020 Insider Data Breach Survey

by EgressSep 23, 2020

97% of CISOs are worried about insider data breaches. And, with unreliable employees their primary 'alert system' and patchy technology deployments to mitigate this risk, it's no wonder why.

Download this report now to learn:

• Why the insider threat is the biggest risk in every organization
• The frequency of accidental and intentional data breaches
• How seniority affects data ownership and ethics

  • Egress
  • Risk Management/Security
  • Security Management & Analytics
  • Details