Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

API Security 101 Whitepaper

by Noname SecurityJan 27, 2022

APIs are everywhere in the modern IT world, and the volume of API traffic is only expected to grow. However, despite the power and popularity of APIs, many organizations struggle with API security. When it comes to securing APIs, traditional application security controls are not a complete solution.

In this API security white paper, we will cover: APIs as a widely adopted integration tool Two elements needed to deliver APIs API security challenges (even those different than

  • Noname Security
  • Cybersecurity
  • Risk Management/Security
  • Security Management & Analytics
  • Details

How to Plan for Endpoint Security Against Ever-evolving Cyberthreats

by HP Enterprise SecuritySep 02, 2021

Endpoints have become a frequent target for cyberattacks and represent a weak link in many organizations' overall security posture. This guide explores the reasons why your endpoints could be at risk and highlights the opportunities to combat these threats.

Read on for guidance on security requirements that should be included in your next RFP and the questions you should ask to strengthen the security of your devices, data, and identity to protect your business against ever-evolving

  • Endpoint Security
  • Security
  • Details

Identity Sprawl and the Toll of Enterprise Identity Debt

by Radiant LogicNov 02, 2020

This white paper is based on research conducted by Aite-Novarica Group between July and September 2021. Key takeaways include: Financial services companies have made significant investments in identity and access management solutions, but still maintain multiple disjointed and isolated identity data stores Fragmented identity repositories can increase risks during acquisitions The Radiant Logic Identity Fabric Data approach can radically simplify complex identity management

  • Radiant Logic
  • Distribution
  • Executive Insights & Innovation
  • Digital Business
  • Details

Quick Guide to Power Distribution

by EatonApr 01, 2020

Rack power distribution units, A.K.A. rack PDUs, are a key component to any IT environment. The right unit can allow you to monitor and control the power at the individual outlet, switch power on and off, remotely shut down the power during an emergency power outage, or simply distribute power efficiently and safely. Learn more about rack PDUs and the modern benefits they can have for your business.

  • Eaton
  • IT Strategy
  • IT Leadership
  • Details

[FreeBook] Network Security

by Taylor & FrancisAug 18, 2020

Network Security is relevant for those looking for understanding on several relevant topics such as authentication, mobile operating systems, and cyber resilience. The new edition also provides a brand new set of must-know fundamentals and tips.

This book features content from a range of CRC Press publications, including:

• Introduction to Computer and Network Security Navigating Shades of Gray, By Richard R. Brooks
• Managing A Network Vulnerability Assessment,

  • Taylor & Francis
  • Network & Perimeter Security
  • Security
  • Details

[Guide] 10 Cloud Strategies to Avoid Cost Overruns

by Informa TechNov 18, 2021

Nearly every company that uses public cloud services -- and at this point, that includes pretty much every company -- has experienced an unexpectedly high bill at some point. And unfortunately, the experts say that problem is likely to get worse before it gets better. The following 10 strategies highlight what other large organizations have found helpful for avoiding public cloud cost overruns. You might not be able to use them all, and every single one of them will require some effort. But they

  • Informa Tech
  • Cloud Services
  • Platform as a Service
  • Details

[Slideshow] 10 Mistakes End Users Make That Drive Security Managers Crazy

by Dark ReadingApr 27, 2018

We pinpointed 10 common ways employees mishandle - and inadvertently breach - an organization's security. Find out what they are here.

  • Dark Reading
  • Security
  • Endpoint Security
  • Risk Management/Security
  • IT Strategy
  • Network & Perimeter Security
  • Details

[Slideshow] 7 Key Stats that Size Up the Cybercrime Deluge

by Dark ReadingApr 26, 2018

Now that we've got a couple of months from this year in the rearview mirror, security researchers have had enough time to crunch the numbers from 2017. That means a raft of new reports analyzing last year's cybersecurity data with updated telemetry on the threat landscape, economic impact, and defense problems facing the cybersecurity industry. Here are some of the most illuminating highlights.

  • Dark Reading
  • Security
  • Endpoint Security
  • IT Strategy
  • Risk Management/Security
  • Cybersecurity
  • Details

[Slideshow] 7 Steps to a Smooth, Secure Cloud Transition

by Dark ReadingApr 27, 2018

If you're thinking with a cloud-first mindset, you should be making sure all the right boxes are checked before you make the leap. Here, security experts highlight the most important steps to keep in mind while moving to the cloud. Find out what they had to say.

  • Dark Reading
  • Cloud Security
  • Cloud Services
  • Cloud
  • Security
  • Risk Management/Security
  • Details

[Strategic Security Report] Assessing Cybersecurity Risk

by Dark ReadingJun 30, 2017

As cyber attackers become more sophisticated and enterprise defenses become more complex, many enterprises are faced with a complicated question: what is the risk of an IT security breach? This report, one of three to come out of Dark Reading's annual Strategic Security Survey, delivers insight on how today's enterprises evaluate the risks they face. In addition to providing survey data on the implementation of risk metrics and best practices, this report offers a look at security professionals'

  • Dark Reading
  • Cybersecurity
  • Risk Management/Security
  • Security Monitoring
  • Details