Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Infrastructure

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







Shifting Left: A DevSecOps Field Guide

by Bishop FoxJun 03, 2022

DevSecOps, when done correctly, can transform how quickly businesses can develop and deploy applications securely. Yet many organizations struggle to put it into practice. Our eBook offers practical recommendations on: How developers and security teams can move towards a DevSecOps model in any organization — with shared responsibility and a repeatable process Which tooling and approaches to consider for application security Implementing DevSecOps without impacting innovation and


Improving Enterprise Cybersecurity With XDR

by Dark ReadingMay 24, 2022

Enterprises are looking at eXtended Detection and Response technologies to improve their abilities to detect, and respond to, threats. While endpoint detection and response is not new to enterprise security, organizations have to improve network visibility, expand data collection and expand threat hunting capabilites if they want their XDR deployments to succeed. This issue of Tech Insights also includes: a market overview for XDR from Omdia, questions to ask before deploying XDR, and an XDR


How an Intelligent Network Can Unburden IT Teams

by FortinetFeb 17, 2022

Today's networks are expected to do more than deliver connectivity and bandwidth. To optimize performance and enable additional functionality, a network needs to be intelligent. The more intelligent the network, the better it will perform, and the more tasks it can offload from IT teams.

Read this Checklist to find out the five important ways that intelligence can be built into the network to make things easier on those running it.


Ensure a Secure LAN Edge for All Devices

by FortinetFeb 17, 2022

With 70% of workers still using personal devices for work and IoT proving to be even more challenging, with headless devices that have limited to no security functionality, Network access control (NAC) solutions can ensure only devices that should attach to the network do, and can restrict what they have access to.

Download this eBook to find out how having basic NAC services baked into a local-area network (LAN) edge solution for simplicity and consistent security policy.


Infographic: 10 Reasons Why Industrial Organizations Need Better Asset Visibility

by DragosMay 10, 2022

A key defense against increasing industrial cyber threats is to fully identify and inventory all your operational technology (OT) assets, including communication pathways. Every cybersecurity process becomes easier and more effective, when you have good asset visibility.

Download this infographic now to discover the 10 reasons why industrial organizations need better asset visibility.


Executive Summary: ICS/OT Cybersecurity 2021 Year in Review

by DragosMay 10, 2022

In 2021, the industrial community attracted high-profile attention. Major cybersecurity incidents struck industrial organizations in a range of sectors, with international headlines detailing everything from a compromise of a water treatment facility with intent to poison its community to a ransomware attack against a pipeline operator that disrupted gas supplies to the southeast United States.

These reports underscored the potential devastating outcomes a security breach of critical


Report: An Executive's Guide to Industrial Cybersecurity

by DragosMay 10, 2022

As enterprises invest heavily in digital transformation, industrial cybersecurity will increasingly serve as a critical enabler for safely and securely advancing business goals through technological innovation.

Advancing connectivity and digitalization of operational technology (OT) provides significant benefits to the business, including: Increased automation Improved process efficiency Better asset utilization Enhanced telemetry of machinery for business forecasting


Whitepaper: PIPEDREAM: Chernovite’s Emerging Malware Targeting Industrial Control Systems

by DragosMay 10, 2022

Threats to industrial infrastructure security are an extremely sensitive matter. Given the unique realities of industrial operations it is often harder for defenders to react than for adversaries to leverage public information. The more time the community has to implement mitigations before new malicious capabilities become public, the better the effects of any attempted attacks can be reduced.

PIPEDREAM is the seventh known Industrial Control Systems (ICS)-specific malware and fifth


Whitepaper: How Dragos Activity Groups Obtain Initial Access into Industrial Environments

by DragosMay 10, 2022

As the threat landscape continues to evolve with a perpetual influx of new network anomalies and Indicators of Compromise (IOC), prudent defenders must focus on more actionable elements of attack characteristics, such as Tactics, Techniques and Procedures (TTPs). One such example of this is the Initial Access Tactic.

Initial access is one of the most important adversarial tactics and may form the critical dependency on which further tactics rely, or conversely it may be the end goal


Architecting and Managing Hybrid and Cloudbased Identity Services

by Radiant LogicApr 25, 2022

One of the world's leading providers of entertainment and information had acquired multiple smaller companies that made up a comprehensive portfolio of brands and subsidiaries—each with its own identity infrastructure, creating an identity management challenge because each subsidiary needed to access shared services such as the corporate network, email, HR apps, etc. To address this challenge, the corporation created an initiative called One Identity.

Learn how they achieved:


SUBTOPICS:

Bishop Fox

Bishop Fox is the leading authority in offensive security, providing solutions ranging from continuous penetration testing, red teaming, and attack surface management to product, cloud, and application security assessments. We've worked with more than 25% of the Fortune 100, half of the Fortune 10, eight of the top 10 global technology companies, and all of the top global media companies to improve their security. Our Cosmos platform was named Best Emerging Technology in the 2021 SC Media Awards and our offerings are consistently ranked as "world class" in customer experience surveys. We're an active participant in the security community and have published more than 16 open source tools and 50 security advisories in the last five years. Learn more at bishopfox.com or follow us on Twitter.


Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


Dragos

Dragos is the industrial cybersecurity expert on a relentless mission to safeguard civilization. In a world of rising cybersecurity threats, Dragos protects the most critical infrastructure (those that provide us with the tenets of modern civilization) from increasingly capable adversaries. Devoted to codifying and sharing our in-depth industry knowledge of ICS/OT systems, Dragos arms industrial defenders around the world with the knowledge and tools to protect their systems as effectively and efficiently as possible.


Fortinet

Fortinet (NASDAQ: FTNT) secures the largest enterprise, service provider, and government organizations around the world. Fortinet empowers its customers with intelligent, seamless protection across the expanding attack surface and the power to take on ever-increasing performance requirements of the borderless network - today and into the future. Only the Fortinet Security Fabric architecture can deliver security without compromise to address the most critical security challenges, whether in networked, application, cloud or mobile environments. Fortinet ranks #1 in the most security appliances shipped worldwide and more than 290,000 customers trust Fortinet to protect their businesses. Learn more at https://www.fortinet.com.


Radiant Logic

Radiant Logic, the enterprise Identity Data Fabric company, provides the cornerstone of complex identity architectures in today's digital world. With Radiant, it's fast and easy to put identity data to work, connecting many disparate data sources across legacy and cloud infrastructures in real-time, without disruption. Their solution creates a solid identity foundation that speeds the success of initiatives, including single sign-on, M&A integrations, identity governance and administration, cloud directory deployments, hybrid and multi-cloud environments, customer identity and access management, and more. From the Fortune 1000 to government agencies, organizations across the globe rely on Radiant to deliver meaningfully faster time-to-value and unprecedented IT agility, while building a secure, future-proof identity infrastructure that meets real-world business demands.