Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Security

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







Understanding XDR

by Palo Alto Networks, Inc.Mar 03, 2021

Over the past few years, many enterprises have discovered the benefits of endpoint detection and response (EDR) tools, which help to identify potential threats and warn security teams to take action. But today, many enterprises are also realizing that other threat surfaces, such as networks and clouds, also provide critical telemetry that can help security teams to quickly identify and respond to threats. In this webinar, experts discuss the benefits and limitations of EDR, and offer


Detecting and Mitigating Attacks on Remote Workers

by Deep InstinctFeb 25, 2021

COVID-19 forced a rapid shift to remote work in every enterprise ?and created a green field for cyber attackers. Early attacks focused on COVID-themed phishing attacks, but today cybercriminals are finding new ways of compromising corporate data via home wi-fi, poorly-secured endpoints, and vulnerable mobile devices. In this webinar, experts discuss some of the cyber attacks that have been made on work-from-home end users, as well as exploits against remote systems and devices. More


The 2021 Threat Hunting Report

by DomainToolsApr 05, 2021

Threat hunting continues to evolve for organizations that focus on proactively detecting and isolating Advanced Persistent Threats (APTs) that might otherwise go undetected by traditional, reactive security technologies.

While many SOCs are struggling to cope with the current security threat workload, more organizations are adopting threat hunting as part of their security operations. They are discovering that proactive threat hunting can reduce the risk and impact of threats while


The Impact of the SolarWinds Breach on Cybersecurity

by DomainToolsApr 05, 2021

The SolarWinds hack has presented a cybersecurity reckoning at a scale never before seen for the US government and private enterprises. While the width and depth of state-sponsored attacks are yet to be determined, one thing is certain: the fallout from the SolarWinds hack is going to get worse before it gets better.

To help determine the impact this breach has had on organizations, Domaintools conducted a survey among security professionals in order to provide the infosec community


Dark Reading Report: Battle for the Endpoint

by Dark ReadingApr 02, 2021

The idea that thousands of work-from-home employees using personal printers and home Wi-Fi might become the norm for some companies was unthinkable not long ago. But, for the IT security manager, the concept of "endpoint security" has evolved significantly. How is your enterprise approaching the endpoint security problem?

In this Tech Insights report by Dark Reading, and sponsored by Palo Alto Networks, experts offer advice and recommendations on how to build an endpoint security


Cybersecurity’s Next Wave: What Every Enterprise Should Know

by Dark ReadingJan 06, 2021

Cybersecurity technology and practices are undergoing a sea change. While COVID-19 quarantines literally turned enterprise networks upside down overnight, a new wave of online attacks put enterprise data at risk. Today?s security operations center, once focused entirely on perimeter defenses, is now abuzz with new disciplines, including threat hunting and incident response. And yesterday?s security technologies are being remade with new capabilities, including artificial intelligence,


Protect Cloud Workloads Against Dangerous Cyberattacks

by MorphisecMar 24, 2021

Workforces are likely to be remote for the foreseeable future. That means securing cloud workloads over the long term is a necessity for today's IT professional. You can start by first assessing the need for additional security measures. While cloud providers will install some, they rarely provide all of the defenses necessary to secure use across a distributed workforce out of box. There's likely a gap that needs to be addressed, which is best done proactively to avoid possible threats.


AV-Comparatives Tests Morphisec Guard

by MorphisecMar 24, 2021

Morphisec Guard prevented 100% of attacks in a recent single-product AV-Comparatives report.


How to Optimize Your Windows 10 Defense Strategy

by MorphisecMar 23, 2021

Read this whitepaper to learn how to enhance your native Windows security controls to block the most sophisticated attacks by consolidating your tech stack and gaining full endpoint visibility without increasing spend.


The Five Major Security Pitfalls of WFH and How to Solve Them

by MorphisecMar 23, 2021

With more people working remotely than ever before, CISOs must craft a flexible security architecture to ensure that those long-term or newly remote workers can access the software they need to do their job in a secure environment. Read the eBook to learn how.


SUBTOPICS:

Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


DomainTools

DomainTools, the recognized leader in domain name research and monitoring tools, offers the most comprehensive searchable database of domain name registration, Whois records and hosting data for online investigations and research. Cyber security analysts, fraud investigators, domain professionals and marketers use DomainTools to investigate cybercrime, protect their assets and monitor online activity. DomainTools has 12 years of history on domain name ownership, Whois records, hosting data, screenshots and other DNS records. That's why customers say, "Every online investigation starts with DomainTools." DomainTools customers include many Fortune 1000 companies, leading vendors in the Security and Threat Intelligence community and most crime-fighting government agencies. Individual users can start with an online Free Trial available at http://www.domaintools.com. Enterprise accounts are available from http://www.domaintools.com/about/contact-us.


Morphisec

Morphisec delivers an entirely new level of innovation to endpoint protection to create a zero-trust execution environment for workstation, VDI and cloud workloads. This proactively creates a prevent-first posture against the most advanced threats to the enterprise, including APTs, file-based malware, zero-days, ransomware, fileless attacks, and web-borne exploits. This complete endpoint security solution easily deploys into a company's existing security infrastructure to form a simple, highly effective, cost-efficient technology stack that is truly disruptive to today's existing cybersecurity model.


Palo Alto Networks, Inc.

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world's greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organizations across cloud, networks, and mobile devices. Our vision is a world where each day is safer and more secure than the one before.