Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Security

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







The Latest Cloud Security Threats & How to Combat Them

by Qualys Inc.Aug 19, 2021

More businesses have shifted critical assets and operations to the cloud, as service providers enhance their security capabilities and companies adapt to more remote workforces. And cyber attackers have adapted accordingly. In this webinar, experts outline the top ways that attackers are exploiting cloud services, applications and implementations and give advice on how to use the cloud more securely.


Forrester's Planning for Failure: How to Survive a Breach

by Palo Alto Networks I Unit 42Sep 03, 2021

You may not stop every cyberattack, but you can avoid the worst effects of a security failure if you have a plan.

Forrester's new report, "Planning for Failure: How to Survive a Breach," covers: Planning for the legal and regulatory complexity of a security breach How to initiate an incident response program, including internal testing and training The benefits of preparation to boost customer trust

Get your complimentary security report now.


Ransomware’s New Trend: Exfiltration & Extortion

by Palo Alto Networks I Unit 42Sep 03, 2021

To stay ahead of data exfiltration and extortion cyber attacks, your organization needs to implement a proactive ransomware protection strategy to prevent threats and prepare for the evolution of ransomware.

In this white paper you'll learn: How data exfiltration is used during ransomware attacks The anatomy of this type of attack Attack tactics, techniques and procedures (TTPs) Best practices to protect your organization

Read this white paper today to make


Unit 42 Incident Response and Data Breach Report

by Palo Alto Networks I Unit 42Sep 03, 2021

Does your organization have the security it needs to outpace new, advanced threats?

Download the 2020 Unit 42 Incident Response and Data Breach Report to learn rich insights into real-world cyber risks and practical advice for protecting your organization, including: Analysis of the top cybersecurity risks by industry Best practices and tips for each risk area Detailed looks into incidents types Equip your organization with the expertise to mitigate cyber risks. Download


2021 Unit 42 Ransomware Threat Report

by Palo Alto Networks I Unit 42Sep 03, 2021

As threat actors continue developing new and updated ransomware variants, how can your organization stay proactive?

Download the "2021 Unit 42 Ransomware Threat Report" to learn: Top ransomware threats and how to identify them Which industries are seeing an increase in ransomware attacks and why Ransomware's future and how you can prepare for what's next Take the first step toward a stronger ransomware prevention and protection strategy. Download the threat report now.


Unit 42 & ESG Incident Response Ebook

by Palo Alto Networks I Unit 42Sep 03, 2021

An incident response plan and retainer are critical to organizational security.

ESG's "An Ounce of Prevention: Investing in Incident Readiness" study reveals significant insight into: The impact of breach preparation on confidence and maturity of response Efficacy of incident readiness services purchased Best practices in the incident response and readiness market Incident response service preferences according to market segment View ESG's study now to get your


6 Threats Enterprises Should Care About

by Dark ReadingSep 08, 2021

Every day, black-hat attackers and white-hat researchers uncover new security vulnerabilities in widely used systems and applications such as Active Directory and printer software. Enterprise defenders need to be aware of the newest — and potentially most impactful — vulnerabilities in order to detect attacks targeting them. In this Tech Insights, top researchers and experts discuss emerging vulnerabilities and countermeasures to prevent them from being exploited in their


Security Alert Fatigue: How to Wake Up and Take Back Control of your SOC

by Qualys Inc.Jul 28, 2021

Adding new security tools to your SOC toolset may help alert you to the newest cyber threats to your business. However, when a zillion unprioritized alerts hit you in a day, you might start treating them like whack-a-mole or the snooze button on your alarm clock. How can you manage security alerts so they are most meaningful to your business, and act on them in an appropriate, timely manner? In this webinar, learn expert tips on how to improve your processes and use orchestration to relieve


Tips for Cleaning Up Cyber Hygiene and Security Basics

by Vulcan CyberAug 23, 2021

With cyber attacks on the rise, having proper cyber hygiene and security basics are essential. If companies could just get the basics right, most of these attacks would be stopped. But doing well at the fundamentals is easier said than done. What are these top "cyber hygiene" priorities that make the biggest difference to security, and what tools/techniques can help enterprises get these things right?


Top 5 Takeaways Security Outcomes Study: Endpoint Edition

by CiscoSep 13, 2021

What did we learn from 4800 security and IT professionals looking to bolster their cybersecurity defenses? This infographic sums up the five key findings.


SUBTOPICS:

Cisco

Cisco (NASDAQ: CSCO) is the worldwide leader in IT that helps companies seize the opportunities of tomorrow by proving that amazing things can happen when you connect the previously unconnected. At Cisco customers come first and an integral part of our DNA is creating long-lasting customer partnerships and working with them to identify their needs and provide solutions that support their success.


Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


Palo Alto Networks I Unit 42

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world's greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices. Our vision is a world where each day is safer and more secure than the one before. For more information, visit www.paloaltonetworks.com.

Unit 42 brings together an elite group of cyber researchers and incident responders to protect our digital way of life. With a deeply rooted reputation for delivering industry-leading threat intelligence, Unit 42 has expanded its scope to provide state-of-the-art incident response and cyber risk management services. Our consultants will serve as trusted partners to rapidly respond to and contain threats so you can focus on your business. Visit unit42.paloaltonetworks.com.


Qualys Inc.

Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud-based security and compliance solutions with over 15,700 customers and active users in more than 130 countries, including a majority of each of the Forbes Global 100 and Fortune 100. Qualys helps organizations streamline and consolidate their security and compliance solutions in a single platform and build security into digital transformation initiatives for greater agility, better business outcomes and substantial cost savings. The Qualys Cloud Platform and its integrated Cloud Apps deliver businesses critical security intelligence continuously, enabling them to automate the full spectrum of auditing, compliance and protection for IT systems and web applications on premises, on endpoints and elastic clouds. Founded in 1999 as one of the first SaaS security companies, Qualys has established strategic partnerships with leading managed service providers and consulting organizations including Accenture, BT, Cognizant Technology Solutions, Deutsche Telekom, DXC Technology, Fujitsu, HCL Technologies, IBM, Infosys, NTT, Optiv, SecureWorks, Tata Communications, Verizon and Wipro. The company is also a founding member of the Cloud Security Alliance. For more information, please visit www.qualys.com.


Vulcan Cyber

Vulcan Cyber has developed the industry's first vulnerability remediation platform, built to help cybersecurity and IT operations teams collaboratively secure digital business. The Vulcan SaaS platform closes the gap between detection and remediation to reduce vulnerability dwell time and associated business risk. Vulcan Cyber orchestrates the full remediation lifecycle from identifying and prioritizing vulnerabilities to curating and delivering the best remedies, to automating processes and fixes through the last mile of remediation. It's unique ability to "get fix done" has garnered Vulcan Cyber recognition as a 2019 Gartner Cool Vendor and an RSAC Innovation Sandbox 2020 finalist. Based in Tel Aviv and San Francisco, Vulcan Cyber is privately funded by cybersecurity specialists YL Ventures and TenEleven Ventures.