Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Security

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







How Secure is Your Azure Cloud Environment?

by Revolutionary SecurityMay 08, 2020

Please note, this webinar has switched to on-demand only and will be available at the end of the month. Details on how to view will be emailed once available. Join Revolutionary Security cloud experts to learn how to protect your Microsoft Azure environment. We'll explore real examples of industry issues, changes in the landscape of cloud security, and the most significant dangers currently impacting Microsoft Azure. Get recommendations you can immediately put into practice to protect your


2020 State of DevOps Report

by InformationWeekJul 30, 2020

Enterprises are quickly moving to DevOps in order to deliver higher quality software faster, and DevOps is maturing a result. However, having the right DevOps tooling isn't enough. A solid DevOps initiative must also have the right culture and processes in place, because people tend to be the biggest barrier to any type of organizational change. The 2020 State of DevOps reveals where the advancements are happening and why, as well as where the challenges remain.

Download the 2020 State


Case Study: Tackling the Challenge Of Non-Employee Management

by SecZettaJul 31, 2020

Geisinger had addressed the need to manage the non-employee population by developing its own homegrown non-employee management solution. Over time, this solution had fallen victim to a common problem with in-house solutions: lack of resources to maintain the solution at an acceptable level. Geisinger needed an out-of-the-box non-employee management solution that could be implemented in a short time-frame. The solution needed to cover the complex requirements and multiple use-cases related to


Online Traffic & Cyber Attacks During COVID-19

by NeustarJul 29, 2020

We all know that in recent months, we have changed the way we connect. How we do business, pursue hobbies, and stay in touch with family and friends all have changed. And we now have data that shows how things have changed online. Download this paper to review what is different, both in terms of traffic and in attacks specfically.


Protect Your Brand, Mitigate Fraud and Defend Your Domain

by NeustarJul 29, 2020

Companies in financial services are attacked by cybercriminals 300 times more often than those in other industries. To fight this onslaught, companies need a layered defense that incorporates comprehensive measures at every later of the IT stack, informed by timely, relevant threat data from authoritative sources.

Download this whitepaper to learn how those companies protect their brand reputation, mitigate fraud and protect their domains.


Emerging Security Threats Your Enterprise Should Be Aware Of

by Ribbon Communications Inc.Jun 19, 2020

Every day, black hat attackers and white hat researchers are discovering new security vulnerabilities. And as COVID-19 changed everything about the way we work and communicate, attackers have created new ways to exploit weakened organizations. Are you aware of the newest ? and most damaging ? vulnerabilities that have been discovered or are active in the wild now? In this webinar, experts discuss some of the most dangerous emerging threats, and what you can do to defend against them.


Special Report: The Changing Face of Threat Intelligence

by Dark ReadingJul 15, 2020

Ten years ago, enterprises' best "threat intel" was limited to what they could read on a few websites or what was unveiled on Microsoft's Patch Tuesday. Today, however, enterprises are overwhelmed with options for receiving new information about cyber threats, ranging from commercial feeds to industry ISACs to specialized tools and services that collect, analyze, and prioritize threat data. How should enterprises aggregate, collate, and interpret threat data? How can they integrate threat data


SANS Report: Factoring Enterprise IoT into Detection and Response

by ExtraHopJul 16, 2020

Download this report from SANS Institute on how to secure IoT devices and:

• Learn about the growth of IoT devices inside corporate networks
• Understand how the IoT boom is reshaping enterprise security
• Explore the benefits of network detection and response for IoT, cloud, and multicloud security


2020 Gartner Market Guide for Network Detection & Response

by ExtraHopJul 16, 2020

Network Detection and Response (NDR) is rapidly emerging as a must-have capability in modern security operations, providing In its second annual Market Guide for Network Detection and Response*, Gartner provides insight into this accelerating market. Key takeaways from Gartner include:

"Enterprises should strongly consider NDR solutions to complement signature-based tools and network sandboxes. Many Gartner clients have reported that NDR tools have detected suspicious network traffic


2020 SANS Remote Workers Poll

by ExtraHopJul 16, 2020

Download this SANS report to learn how the tech workforce has adapted to work-from-home and how organizations have navigated the new challenges posted:

• Learn what resources are the priority for remote workers
• Find out the biggest barriers to efficiency
• Get insights on data accessibility and security


SUBTOPICS:

Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


ExtraHop

ExtraHop is the leader in real-time IT analytics. Our platform makes data-driven IT a reality, applying advanced analytics and cloud-based machine learning to all digital interactions to deliver timely and accurate insight. IT leaders turn to ExtraHop first to help them make faster, better-informed decisions that improve performance, security, and digital experience. Just ask the hundreds of global ExtraHop customers, including Sony, Lockheed Martin, Microsoft, Adobe, and Google. To experience the power of ExtraHop, explore our interactive online demo: www.extrahop.com/demo


InformationWeek

InformationWeek is the leading multimedia Business Technology brand providing CIOs and IT decision makers with unique perspective and tools that work in lock step with their decision making process - from the setting of business strategies to the evaluation and recommendation of technology solutions. Through its cross-media platform, which includes online sites, magazine, events and research, InformationWeek provides editorial content developed by both journalists and CIO and IT peers delivered when and how they want it, 24/7. The InformationWeek audience of more than 2 million buyers includes CIOs, IT executives and business managers who span across industries, job titles, company sizes and global borders.


Neustar

Neustar is an information services and technology company and a leader in identity resolution providing the data and technology that enables trusted connections between companies and people at the moments that matter most. Neustar offers industry-leading solutions in Marketing, Risk, Communications, Security and Registry that responsibly connect data on people, devices and locations, continuously corroborated through billions of transactions. Neustar serves more than 8,000 clients worldwide, including 60 of the Fortune 100. Learn how your company can benefit from the power of trusted connections here: https://www.home.neustar.


Ribbon Communications Inc.

Ribbon Communications Inc. (Nasdaq: RBBN) delivers market-leading software solutions that secure and power many of the world's leading service provider and enterprise communications environments. Built on world-class technology and intellectual property, the company's cloud-native solutions deliver intelligent and secure real-time communications solutions for the cloud, network and enterprise edge. Ribbon's Kandy Cloud real-time communications software platform delivers advanced and embedded CPaaS and UCaaS capabilities enabling service providers to rapidly create and deploy high-value communications services. With locations in more than 25 countries and on six continents, Ribbon's innovative, market-leading portfolio empowers service providers and enterprises with carrier-grade real-time communications solution, along with a new level of security that runs in their network infrastructure, data centers and private cloud, or in the public cloud.


SecZetta

SecZetta provides third-party identity risk solutions that enable organizations to execute risk-based identity access and lifecycle strategies for diverse non-employee populations. Our solutions are purpose-built to manage the dynamic relationships organizations have with non-employees in an easy-to-use application that helps facilitate commercial strategies, support regulatory compliance, and reduce third-party risk.