Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Security

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







DevOps: Innovating with Speed, Security, and Quality

by VeracodeJun 22, 2020

Creating an environment that is capable of shifting and adapting to market demands isn?t always easy. But DevOps does make it happen, as long as you understand how to innovate with DevOps. First of all, DevOps isn?t just two words combined together. DevOps is a cultural shift, a philosophy, a practice, a tool, and even a process. The concept of DevOps isn?t just a single tool or platform. Rather, it truly is a shift in thinking in how you deliver services, applications, and even business


Securing Active Directory the Way it Deserves

by ExtraHopJul 08, 2020

Credential theft and lateral movement are now regular, everyday tricks of the cyber attacker trade. So it?s imperative that every business secure the foundations of its enterprise access control system: Active Directory. And yet, for many organizations, Active Directory management and security is a major challenge, and they don?t know where to begin. In this webinar, experts will explain the latest AD-related threats and help you get your new or legacy AD in order so you?re prepared for


7 New Cybersecurity Vulnerabilities That Could Put Your Enterprise at Risk

by Dark ReadingJul 27, 2020

In this Dark Reading Tech Digest, we look at the ways security researchers and ethical hackers find critical vulnerabilities and offer insights into how you can fix them before attackers can exploit them.

Here's a preview of what's inside: 7 New Cybersecurity Vulnerabilities That Could Put Your Enterprise at Risk Vulnerabilities Declining in Open Source, but Slow Patching Still a Problem Firmware Flaw Allows Attackers to Evade Security on Some Home Routers Cisco Patches Flaw in


Forrester Research: The State of Data Security and Privacy

by FortanixAug 10, 2020

Download this Forrester Research report to learn: Data breach trends and statistics Data security and privacy technology adoption The implications of data security trends for information security programs


Multicloud Data Security: Cloud Security Landscape

by FortanixAug 10, 2020

Download this whitepaper to learn: Multi-Cloud trends affecting data security 5 approaches to securing data in multiple clouds Migrating data and applications to the cloud Building a cloud first data security service The importance of key management, secrets management, and tokenization in cloud data security


CISO Guide: The Digital Transformation of Data Security

by FortanixAug 10, 2020

Download this whitepaper to learn: Leading the digital transformation of data security Implementing your data security program Implementing Data Security Controls Unlocking Business Opportunities Through Data Security


Making Zero-Trust Work for Work From Home

by CiscoJul 14, 2020

When organizations abruptly sent vast numbers of employees home, their carefully planned security architectures were faced with major new challenges. Precious corporate endpoint devices sent to unfamiliar locations, connecting to routers that use default passwords, and sharing space with unsecured IoT devices. Is a zero-trust security architecture even possible in a situation like this? In this Dark Reading webinar, learn how to make layered, zero-trust architecture work among today?s business


10-step Executive Action Plan for Collective Defense

by IronNet CybersecurityAug 04, 2020

A Collective Defense strategy — where companies, sectors, states, and nations collaborate on cyber defense as a united force — is providing a growing advantage against cyber attacks. This approach is quickly taking root. But how do you put Collective Defense into action?

In this eBook, you will learn: Key elements of Collective Defense Steps for preparing your organization Steps for leveraging advanced detection technologies Steps for collaborating for stronger defense


6 Misconceptions about Collective Defense for Cybersecurity

by IronNet CybersecurityAug 04, 2020

Representing all industries and sectors, we are standing at a historical inflection point in how we conduct cyber defense. In the face of highly sophisticated adversaries with nearly limitless time and resources, individual organizations no longer can defend sufficiently, nor should they have to with the technology now available to make Collective Defense possible.

To mount an effective and affordable defense, we have to defend as teams across sectors, cities, states, and nations.


How Secure is Your Azure Cloud Environment?

by Revolutionary SecurityMay 08, 2020

Join Revolutionary Security cloud experts to learn how to protect your Microsoft Azure environment. We'll explore real examples of industry issues, changes in the landscape of cloud security, and the most significant dangers currently impacting Microsoft Azure. Get recommendations you can immediately put into practice to protect your critical assets in the cloud and a roadmap for increasing your cloud security posture.


SUBTOPICS:

Cisco

Cisco (NASDAQ: CSCO) is the worldwide leader in IT that helps companies seize the opportunities of tomorrow by proving that amazing things can happen when you connect the previously unconnected. At Cisco customers come first and an integral part of our DNA is creating long-lasting customer partnerships and working with them to identify their needs and provide solutions that support their success.


Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


ExtraHop

ExtraHop is the leader in real-time IT analytics. Our platform makes data-driven IT a reality, applying advanced analytics and cloud-based machine learning to all digital interactions to deliver timely and accurate insight. IT leaders turn to ExtraHop first to help them make faster, better-informed decisions that improve performance, security, and digital experience. Just ask the hundreds of global ExtraHop customers, including Sony, Lockheed Martin, Microsoft, Adobe, and Google. To experience the power of ExtraHop, explore our interactive online demo: www.extrahop.com/demo


Fortanix

Fortanix unlocks the power of organizations' most valuable data by securing it throughout its lifecycle, on premises and in the cloud. Fortanix secures applications and data everywhere — at rest, in motion, and in use with its Runtime Encryption® technology.


IronNet Cybersecurity

Since IronNet was founded in 2014, our mission has been to deliver the power of collective cybersecurity to defend companies, sectors, and nations so that people, companies, and nations can live and work with peace of mind in cyberspace. Today, organizations around the world turn to IronNet to detect known and unknown cyber threats targets in their networks and share that information with peers so that all members can collectively defend against that threat.


Veracode

Veracode's the only independent provider of cloud-based application intelligence and security verification services. The Veracode platform provides the fastest, most comprehensive solution to improve the security of internally developed, purchased or outsourced software applications and third-party components. By combining patented static, dynamic and manual testing, extensive eLearning capabilities, and advanced application analytics, Veracode enables scalable, policy-driven application risk management programs that help identify and eradicate numerous vulnerabilities by leveraging best-in-class technologies from vulnerability scanning to penetration testing and static code analysis. Veracode delivers unbiased proof of application security to stakeholders across the software supply chain while supporting independent audit and compliance requirements for all applications no matter how they are deployed, via the web, mobile or in the cloud. Veracode works with customers in more than 80 countries worldwide representing Global 2000 brands. For more information, visit www.veracode.com, follow on Twitter