Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.



Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...


From MFA to Zero Trust

by Duo SecurityJan 07, 2021

A zero-trust security model can help you secure against threats such as phishing, stolen credentials and out-of-date devices that may be vulnerable to known exploits and malware. To secure the workforce, you need to verify the identity of the user and ensure the security of their device before granting access to only the applications they need. This guide covers the pillars of Zero Trust and lays out a practical approach in five phases for implementing Zero Trust for the Workforce.

Full Body Exposure: CybelAngel Analysis of Medical Data Leaks

by CybelAngelDec 23, 2020

CybelAngel conducted a 6 month investigation into Network Attached Storage (NAS) and Digital Imaging and Communications in Medicine (DICOM), the de facto standard used by healthcare professionals to send and receive medical data. The discovery? More than 45 million medical imaging files — including X-rays, and CT scans - along with personal healthcare info freely accessible on unprotected servers.

Learn about DICOM protocol and PACS server vulnerabilities, and how to stop

AT&T Cybersecurity Insights™ Report: 5G and the Journey to the Edge

by AT&T CybersecurityDec 17, 2020

The AT&T Cybersecurity Insights™ Report: 5G and the Journey to the Edge examines global data on cybersecurity and the future of computing. Learn how to help protect your enterprise in a world of edge computing and IoT connectivity, led by the transition to 5G.

Insights include:
• Drivers for 5G differentiation
• Cybersecurity for 5G connected assets and what a shared responsibility model between the network provider and the customer means
• Zero

The Relationship Between Security Maturity and Business Enablement

by AT&T CybersecurityDec 17, 2020

In March 2020, AT&T Cybersecurity and Enterprise Strategy Group (ESG) completed a benchmark survey to better understand what a mature cybersecurity program looks like and how that maturity influences security and business outcomes.

Results from the 500 security professionals surveyed on their processes, policies, and controls were mapped into the NIST Cybersecurity Framework's (CSF) five foundational cybersecurity functions: Identify, Protect, Detect, Respond and Recover.

Evaluator's Guide for Managed Detection and Response (MDR) Services

by AT&T CybersecurityDec 17, 2020

Many organizations, inundated by the magnitude and complexity of cybersecurity, are turning to managed detection and response (MDR) services.

In this evaluator's guide, you'll learn what to look for and what questions to ask when assessing an MDR solution, including:

• The basic services every MDR should provide
• 10 key elements to evaluate
• 4 pitfalls to avoid

Download this guide now to better equip yourself on what to look for in

Enable and Protect Your Remote Workforce

by AT&T CybersecurityDec 17, 2020

This white paper is intended to help you make smart, strategic decisions on the tools and services available to bolster cybersecurity readiness in a remote environment, covering:

• Cybersecurity risks for remote workers
• Challenges of security for remote access
• Helping a new remote workforce withstand cybersecurity risks
• What to look for in remote security solutions

Download today to take a holistic approach to help protect your

The Essential Guide to Secure Web Gateway

by AT&T CybersecurityDec 17, 2020

The rapid adoption of cloud-based applications combined with a more mobile, distributed workforce has put a lot of stress on cyber defenses. It's challenging for administrators to maintain visibility and control over data, or to apply unified security policies. Secure web gateway (SWGs) using cloud-native technology help provide coverage to these and other gaps.

This white paper details:
• 5 network disruptors—and how a SWG solves for them
• Technologies

The State of Threat Detection and Response

by Dark ReadingDec 08, 2020

Many organizations have invested in improving their threat detection capabilities over the past two years and express increased confidence in their ability to stop threats that have penetrated the network perimeter. However, these organizations also cite a number of weaknesses and areas for further improvement, including limited log visibility, limited threat visibility, and an over-reliance on manual processes.

In 2020, Dark Reading surveyed IT and cybersecurity professionals to

Infographic: Cloud Security Now

by Palo Alto Networks | Prisma CloudDec 11, 2020

Prisma Cloud conducted a global survey to ask security and DevOps teams on the forefront of cloud native development: What's happening in cloud security now? The result is the largest, most globally expansive market research dataset on cloud native security to date.

This infographic presents the highlights including:

• The top challenges teams are facing
• How much teams are spending (and what they're spending it on)
• What are the most successful

From the Node Up: The Complete Guide to Kubernetes Security

by Palo Alto Networks | Prisma CloudDec 11, 2020

Kubernetes is a many-layered beast, a complex platform that consists of more than half a dozen components. While it offers a handful of native security features, fully securing your environment means addressing various types of potential vulnerabilities across layers of infrastructure.

Fortunately, the fact that Kubernetes is a sprawling platform with so many integrations also makes it possible to build an automated, systemic set of processes to secure the build and deployment


AT&T Cybersecurity

AT&T Cybersecurity helps make your network more resilient. Together, the power of the AT&T network, or SaaS-based solutions with advanced technologies including virtualization and actionable threat intelligence from AT&T Alien Labs and the Open Threat Exchange™, and our relationship with more than 40 best-of-breed vendors, accelerate your response to cybersecurity threats. Our experienced consultants and SOC analysts help manage your network transformation to reduce cybersecurity risk and overcome the skills gap. Our mission is to be your trusted advisor on your journey to cybersecurity resiliency, making it safer for your business to innovate.


CybelAngel reduces global enterprise digital risk by detecting critical data leaks outside the firewall before these leaks become major data breaches. Leveraging its Augmented Intelligence, a unique combination of proven machine learning capabilities and superior cyber analysts, CybelAngel analyzes billions of data sources, files, and threats across all layers of the internet to discover critical data leaks for their customers. Global organizations rely on CybelAngel every day to detect critical data leaks before wreaking havoc on their business.

Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.

Duo Security

Duo Security, now part of Cisco, is the leading multi-factor authentication (MFA) and and secure access provider. Duo comprises a key pillar of Cisco Secure™s Zero Trust offering, the most comprehensive approach to securing access across IT applications and environments, from any user, device, and location. Duo is a trusted partner to more than 25,000 customers globally, including Bird, Facebook, Lyft, University of Michigan, Yelp, Zillow and more. Founded in Ann Arbor, Michigan, Duo also has offices in Austin, Texas; San Francisco, California; and London. Try it for free at

Palo Alto Networks | Prisma Cloud

Prisma Cloud is the industry's most comprehensive Cloud Native Security Platform (CNSP) with the broadest security and compliance coverage — for applications, data, and the entire cloud native technology stack — throughout the development lifecycle and across multi- and hybrid-cloud environments. Our integrated approach enables security operations and DevOps teams to stay agile, collaborate effectively and accelerate secure cloud native application development.