Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Security

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







Key to Cloud Success: The Right Management

by InformationWeekApr 27, 2020

A cloud computing strategy isn't some new version of plug-and-play. When your organization signs the contract for use of the public cloud or SaaS application, your path to success with a cloud computing strategy is only just beginning. The real work — and the real benefit — comes with careful and proactive management of the cloud infrastructure and applications. We're talking about performance optimization, managing your providers, and ongoing license management, among other tasks.


How Cybersecurity Incident Response Programs Work (and Why Some Don’t)

by Dark ReadingMay 05, 2020

This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.

Here's a preview of what's inside: How Cybersecurity Incident Response Programs Work (and Why Some Don't) Cyber Resilience Benchmarks 2020 How a Manufacturing Firm Recovered from a


Menlo Security's New Remote Working Realities Are Altering the Security and IT Landscape

by Menlo SecurityMay 07, 2020

See how Menlo Security is delivering security through the cloud, allowing organizations to offload Internet traffic from legacy networks security architectures such as VPNs and firewalls. To learn more, download this white paper.


Gartner's Solving the Challenges of Modern Remote Access

by Menlo SecurityMay 07, 2020

With the rise of cloud-based applications and architectures, neglected legacy VPN architectures are failing to keep up. See Gartner's recommendations on how to migrate to large-scale remote access.


The Essential Guide to Security

by SplunkMay 15, 2018

Learn how machine data can solve common security use cases and how to get started with the Splunk platform.


Fighting Cybercrime in a Pandemic Threat Landscape

by PrevailionMar 31, 2020

The cyber risk landscape is shifting dramatically during this pandemic.A huge wave of employees are migrating from protected work environments to unprotected home environments, providing a prime attack surface for threat actors. Cyber criminals are looking eagerly for ways to exploit weaknesses in these new teleworkers and gain access to otherwise secure company networks.In addition, the same industry sectors that are disproportionately hit by COVID-19 have become softer targets for cyber


2020 SANS Network Visibility and Threat Detection Survey

by ExtraHopMay 01, 2020

As organizations move to the cloud, encrypt communications, adopt IoT and manage third-party vendors, the complexity of the network increases--impeding visibility and impacting security. In this SANS survey, 59% believe that lack of network visibility poses a high or very high risk to their operations, and 64% of respondents experienced at least one compromise over the past 12 months.

Network data flowing between clients and applications is a rich source of information, which can be


Top Threats to Cloud Computing: The Egregious 11

by ExtraHopMay 01, 2020

You've known for a long time that enhancing your security is critical as you move more workloads from the on-premises datacenter to the cloud. Many organizations are being proactive by reexamining their cloud security posture. Given the events of the last couple months, it's a good time to resurface the Cloud Security Alliance's (CSA) "Egregious 11" list of top vulnerabilities and threats.

This CSA's report shines a light on the challenges security teams face, offers key takeaways


10 Essential Capabilities of a Modern SOC

by SplunkApr 30, 2020

Security teams are hard at work on the front lines: identifying, analyzing and mitigating threats facing their organization. But despite their best efforts, incident backlogs continue to grow. The reality is that there simply aren't enough skilled professionals to analyze the volume of incidents that most organizations face.

But a modern security operations center (SOC), powered by and built on a data-to-everything platform, has visibility across the entire enterprise. A single suite


Vulnerability Management for Dummies, 2nd Edition

by Qualys Inc.Apr 30, 2020

Get the Newest Insights on How to Implement a Successful Vulnerability Management Program

If you are responsible for network security, you need to understand how to prevent attacks by eliminating network weaknesses that leave your business exposed and at risk. Whether your network consists of just a handful of computers or thousands of servers distributed around the world, this newly revised, 6-part book will clearly help: Explain the critical need for Vulnerability Management (VM)


SUBTOPICS:

Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


ExtraHop

ExtraHop is the leader in real-time IT analytics. Our platform makes data-driven IT a reality, applying advanced analytics and cloud-based machine learning to all digital interactions to deliver timely and accurate insight. IT leaders turn to ExtraHop first to help them make faster, better-informed decisions that improve performance, security, and digital experience. Just ask the hundreds of global ExtraHop customers, including Sony, Lockheed Martin, Microsoft, Adobe, and Google. To experience the power of ExtraHop, explore our interactive online demo: www.extrahop.com/demo


InformationWeek

InformationWeek is the leading multimedia Business Technology brand providing CIOs and IT decision makers with unique perspective and tools that work in lock step with their decision making process - from the setting of business strategies to the evaluation and recommendation of technology solutions. Through its cross-media platform, which includes online sites, magazine, events and research, InformationWeek provides editorial content developed by both journalists and CIO and IT peers delivered when and how they want it, 24/7. The InformationWeek audience of more than 2 million buyers includes CIOs, IT executives and business managers who span across industries, job titles, company sizes and global borders.


Menlo Security

Menlo Security protects organizations from cyberattacks by eliminating the threat of malware from the web, documents, and email. Menlo Security has helped hundreds of Global 2000 companies and major government agencies achieve Zero Trust Internet. The company's cloud-based Internet Isolation Platform scales to provide comprehensive protection across enterprises of any size, without requiring endpoint software or impacting the end-user experience.The company was named a Visionary in the Gartner Magic Quadrant for the Secure Web Gateway.


Prevailion

Prevailion helps organizations reduce cyber risk by providing clear, real-time, and continuous visibility into compromises affecting their entire ecosystem, giving them a competitive edge and empowering them to make strategic business decisions about how, when and with whom to share access to their networks.


Qualys Inc.

Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud-based security and compliance solutions with over 15,700 customers and active users in more than 130 countries, including a majority of each of the Forbes Global 100 and Fortune 100. Qualys helps organizations streamline and consolidate their security and compliance solutions in a single platform and build security into digital transformation initiatives for greater agility, better business outcomes and substantial cost savings. The Qualys Cloud Platform and its integrated Cloud Apps deliver businesses critical security intelligence continuously, enabling them to automate the full spectrum of auditing, compliance and protection for IT systems and web applications on premises, on endpoints and elastic clouds. Founded in 1999 as one of the first SaaS security companies, Qualys has established strategic partnerships with leading managed service providers and consulting organizations including Accenture, BT, Cognizant Technology Solutions, Deutsche Telekom, DXC Technology, Fujitsu, HCL Technologies, IBM, Infosys, NTT, Optiv, SecureWorks, Tata Communications, Verizon and Wipro. The company is also a founding member of the Cloud Security Alliance. For more information, please visit www.qualys.com.


Splunk

Splunk was founded to pursue a disruptive new vision: make machine data accessible, usable and valuable to everyone. Machine data is one of the fastest growing and most pervasive segments of "big data" - generated by websites, applications, servers, networks, mobile devices and the like that organizations rely on every day. By monitoring and analyzing everything from customer clickstreams and transactions to network activity and call records -and more, Splunk turns machine data into valuable insights no matter what business you're in. It's what we call operational intelligence.