Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Security

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







Assess your Security Effectiveness

by CyCognitoMay 22, 2020

Conducting an organizational self-assessment of the strengths and weaknesses of your cybersecurity program is a critical process that should be an ongoing activity for every organization.

By establishing a baseline security evaluation of your cybersecurity effectiveness, you can measure your progress over time and implement plans to better align your program to your business priorities. This helps you improve your security program and ensure that investments in people and technology


The State of IT and Cybersecurity Operations

by ExtraHopApr 27, 2020

As companies tighten their belts, the need for coordination between IT and Cybersecurity Operations has never been more urgent. Now is the time to align organizational priorities and budgets. Dark Reading recently took a measure of the relationship between IT and Security teams. Join us as we discuss the survey, share it's findings and review best practices for CIOs and other leadership roles.


Mandiant Security Effectiveness Report 2020

by MandiantMay 15, 2020

The Mandiant Security Effectiveness Report 2020 explores cyber security performance across enterprise production environments and reveals how well organizations are protecting themselves against cyber threats.

Download the report to learn: Why a majority of tested attacks successfully infiltrate enterprise environments without detection The fundamentals of security validation and why it's so critical How to improve the effectiveness of security controls


Automate Testing Using MITRE ATT&CK® with Verodin Security Validation

by MandiantMay 15, 2020

Organizations are increasingly adopting MITRE ATT&CK® as a foundational element to their security programs. The Automate Testing Using MITRE ATT&CK® with Verodin paper provides organizations with a clear understanding of how security validation technology enables organizations to automate their ATT&CK-based effectiveness programs to optimize their defenses.

The white paper covers: The challenges of ATT&CK tactical implementation Emulation vs simulation Behavioral testing


SANS 2020 Top New Attacks and Threat Report

by MandiantMay 15, 2020

In this paper, SANS Director of Emerging Security Trends John Pescatore highlights key themes from analysis of new attack techniques presented by SANS at the RSA 2020 Conference.

The paper includes: An overview of the top new attacks and threats Insight into overall cybersecurity trends on both the offensive and defensive sides Advice on the steps enterprises must take to evolve critical skills, processes and controls to mitigate current and future risks


Case Study: Continuously Validate Cybersecurity Controls

by MandiantMay 15, 2020

Are you able to get evidence-based data to show progress and improvements in your cybersecurity strategy?

Read this case study to understand how Mandiant Security Validation (formerly Verodin), empowers leading financial services organization Torchmark Corporation to continuously validate cybersecurity controls and realize improvements in key areas such as: People and process conditioning Communicating the effectiveness of security controls Real-time insights into environmental drift


CyberSecurity Trends 2020

by MandiantMay 15, 2020

Without ongoing validation that security solutions are working as promised, businesses can be caught off-guard when an attempted hack is successful, and the financial impact and cost to brand reputation can be highly disruptive and long-lasting.

Read the Verodin Cybersecurity Trends 2020 eBook, to understand the four key trends that will shape how users and vendors of security technology approach the evolving threat landscape.


The Future of the Security Operations Center (SOC)

by Palo Alto NetworksApr 14, 2020

Today's security operations centers (SOCs) are helping enterprises to defend critical data and initiate security incident response. But most experts agree that today?s SOCs will evolve radically in the near future, as technologies such as orchestration, machine learning, artificial intelligence, and security automation become more tightly integrated into SOC processes. In this webinar, top experts will discuss the long-term evolution of SOC technology, staffing, and processes, and how your


Key to Cloud Success: The Right Management

by InformationWeekApr 27, 2020

A cloud computing strategy isn't some new version of plug-and-play. When your organization signs the contract for use of the public cloud or SaaS application, your path to success with a cloud computing strategy is only just beginning. The real work — and the real benefit — comes with careful and proactive management of the cloud infrastructure and applications. We're talking about performance optimization, managing your providers, and ongoing license management, among other tasks.


How Cybersecurity Incident Response Programs Work (and Why Some Don’t)

by Dark ReadingMay 05, 2020

This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.

Here's a preview of what's inside: How Cybersecurity Incident Response Programs Work (and Why Some Don't) Cyber Resilience Benchmarks 2020 How a Manufacturing Firm Recovered from a


SUBTOPICS:

CyCognito

CyCognito provides solutions that identify and eliminate shadow risk: risk that IT and security teams are blind to, but sophisticated attackers actively target. The CyCognito platform is a fully automated next-generation security risk assessment solution that enables leading companies to discover, understand, prioritize and eliminate their organization's shadow risk wherever it is, including cloud, partner and subsidiary environments.


Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


ExtraHop

ExtraHop is the leader in real-time IT analytics. Our platform makes data-driven IT a reality, applying advanced analytics and cloud-based machine learning to all digital interactions to deliver timely and accurate insight. IT leaders turn to ExtraHop first to help them make faster, better-informed decisions that improve performance, security, and digital experience. Just ask the hundreds of global ExtraHop customers, including Sony, Lockheed Martin, Microsoft, Adobe, and Google. To experience the power of ExtraHop, explore our interactive online demo: www.extrahop.com/demo


InformationWeek

InformationWeek is the leading multimedia Business Technology brand providing CIOs and IT decision makers with unique perspective and tools that work in lock step with their decision making process - from the setting of business strategies to the evaluation and recommendation of technology solutions. Through its cross-media platform, which includes online sites, magazine, events and research, InformationWeek provides editorial content developed by both journalists and CIO and IT peers delivered when and how they want it, 24/7. The InformationWeek audience of more than 2 million buyers includes CIOs, IT executives and business managers who span across industries, job titles, company sizes and global borders.


Mandiant

Today's business world requires security validation. Without data-driven evidence that validates security effectiveness, companies operate on assumptions and are at risk of an attack. Through automated, continuous monitoring and measurement against real-world attack behaviors, Mandiant Security Validation (formerly Verodin) enables organizations to achieve optimal cybersecurity performance through ongoing assessment, optimization and rationalization.


Palo Alto Networks

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world's greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organizations across cloud, networks, and mobile devices. Our vision is a world where each day is safer and more secure than the one before.