Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Security

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







Building a Security Culture

by VeracodeOct 15, 2019

Most successful cyber security incidents involve a human at your business -- being manipulated, making an honest mistake, or deliberately taking malicious action. So to defend your organization from any cyber threat, all your users must be ever-vigilant: from your app developers to your accountants, from the CEO to the interns. So how do you build a business-wide culture that values security? How do you not only properly educate users on the threats, but make them care about them? In this


U.S. State Protection Laws 2019

by SpirionNov 14, 2019

A great deal of effort was spent this year educating the business and private sector about the 2020 California Consumer Privacy Act (CCPA). However, are you familiar with the 18 other consumer-centric data protection laws that went into effect in 2019? Find out about their nuances like breach notification and data protection requirements in this infographic on US data protection laws.


Data Classification for Dummies

by SpirionNov 14, 2019

Download this whitepaper to discover how to identify sensitive data, implement a data classification process, and minimize the risk of data breaches. You'll also learn about the risks of not classifying data and the components of a data classification and sensitive data management life cycle. This whitepaper will arm you with the tools for managing risks and preventing the next financially damaging breach of sensitive data.


Leverage Existing DLP Investments for Compliance

by SpirionNov 14, 2019

Read this case study to learn how a financial institution integrated Spirion's discovery and classification solution with their existing McAfee DLP to achieve comprehensive PCI compliance


The California Consumer Privacy Act: Meet Full Compliance

by SpirionNov 14, 2019

The California Consumer Privacy Act (CCPA) goes into effect on January 1, 2020. Its primary function is to enhance privacy rights and consumer protections for California residents. The CCPA regulates what businesses can and cannot do with personal information they collect. Its considered a landmark legislation on data protection because of its strict guidelines.

This whitepaper provides insight on the new CCPA and how the Spirion data discovery, classification, and protection platform


Azure Information Protection: Optimized for Risk Management and Data Loss Prevention

by SpirionNov 14, 2019

Many organizations have the Microsoft Azure Information Protection (AIP) platform but are not able to optimize it. With the discovery of all structured and unstructured sensitive data and 2% false-positive rates, an organization can save both time and money. In this case study, find out how a leading pharmaceutical supplier bridged the gap for a unified solution, protecting all sensitive data.


Unified Communications Security: How Analytics Addresses the Threats You Don’t Even Know About

by Ribbon Communications Inc.Oct 02, 2019

As unified communications (UC) adoption grows, so too does the number of bad actors who prey on vulnerabilities. The source of vulnerabilities stem from a lack of understanding risks and subsequent lack of best practices to address UC security threats. When a serious threat strikes, without the right security solution that can see across the entire UC network -- IT staff will only have reactive after-the-fact options. Wondering what can your organization do, to best protect itself from these bad


Navigating the Deluge of Security Data

by Dark ReadingNov 01, 2019

In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. System logs, security tools, network telemetry, endpoint, and mobile reports may all provide clues that help reveal a cyberattack. We examine some examples of how enterprises can cull this data to find the clues they need.

Here's what's inside: Navigating the Deluge of Security Data Overburdened SOC Analysts Shift Priorities Microsoft Debuts Azure


The Cofense Annual Phishing Report 2019

by CofenseNov 12, 2019

When users report suspicious emails they become active defenders, a powerful force united to stop phishing attacks. Download this new study to learn why email reporting-- human action, not mere awareness or technical controls-- is the beating heart of a strong phishing defense.


5 Ways to Deliver Intelligent Phishing Defense

by CofenseNov 12, 2019

90% of phishing threats are found in environments using Secure Email Gateways. When you educate your people and equip them with purpose-built solutions, you significantly lower your risk to phishing attacks. Download this ebook to explore five ways to better defend your organization.


SUBTOPICS:

Cofense

Cofense focuses on engaging the human &emdash; your last line of defense after a phish bypasses other technology &emdash; and enabling incident response teams to quickly analyze and respond to targeted phishing attacks.


Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


Ribbon Communications Inc.

Ribbon Communications Inc. (Nasdaq: RBBN) delivers market-leading software solutions that secure and power many of the world's leading service provider and enterprise communications environments. Built on world-class technology and intellectual property, the company's cloud-native solutions deliver intelligent and secure real-time communications solutions for the cloud, network and enterprise edge. Ribbon's Kandy Cloud real-time communications software platform delivers advanced and embedded CPaaS and UCaaS capabilities enabling service providers to rapidly create and deploy high-value communications services. With locations in more than 25 countries and on six continents, Ribbon's innovative, market-leading portfolio empowers service providers and enterprises with carrier-grade real-time communications solution, along with a new level of security that runs in their network infrastructure, data centers and private cloud, or in the public cloud.


Spirion

Spirion is a pioneer in the critical first step of data security and compliance -- intelligent data discovery and classification. This step positions organizations to achieve unparalleled protection of sensitive data in today's ever-changing regulatory landscape -- and proactively minimizes the risks, costs, and reputational damage of cyberattacks.


Veracode

Veracode's the only independent provider of cloud-based application intelligence and security verification services. The Veracode platform provides the fastest, most comprehensive solution to improve the security of internally developed, purchased or outsourced software applications and third-party components. By combining patented static, dynamic and manual testing, extensive eLearning capabilities, and advanced application analytics, Veracode enables scalable, policy-driven application risk management programs that help identify and eradicate numerous vulnerabilities by leveraging best-in-class technologies from vulnerability scanning to penetration testing and static code analysis. Veracode delivers unbiased proof of application security to stakeholders across the software supply chain while supporting independent audit and compliance requirements for all applications no matter how they are deployed, via the web, mobile or in the cloud. Veracode works with customers in more than 80 countries worldwide representing Global 2000 brands. For more information, visit www.veracode.com, follow on Twitter