Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Search Results:

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:










Webcast: Getting the Most from Threat Intelligence

by ThreatConnectJan 23, 2020

To get the most out of your relationships with information sharing groups (ISACs) and your threat intelligence feeds, you must understand how, why, and when other organizations' cyber attacks relate to your own organization. In this webinar, learn how to take a fresh look at external threat intelligence and ensure you have an up-to-date view of attackers? means, motives and opportunity.


eBook: Service Account Security for Dummies eBook

by ThycoticJan 21, 2020

Get control of service account sprawl and develop a strategy to properly protect and secure service account access to lock down your privileged account attack surface. Learn about service account governance and day-to-day best practices, and the key criteria for managing them with automated cyber security tools.


Research Report: 2019 State of Privileged Access Management (PAM) Maturity Report

by ThycoticJan 21, 2020

With up to 80 percent of breaches due to compromised credentials, more organizations than ever before are prioritizing privileged account protection. Thycotic's "State of PAM Maturity" report highlights the disturbing results based on more than 450 responses worldwide to our online PAM Maturity Assessment.

See the three major key takeaways from the survey and recommendations for action in the complete 2019 State of Privileged Access Management (PAM) Maturity Report.
85% are still


Tutorial: Incident Response Plan Template

by ThycoticJan 21, 2020

Thycotic's free incident response plan template is designed to prevent a cyber breach from becoming a cyber catastrophe. It helps IT operations, security and incident response teams form a united front against an attack to coordinate actions and maintain business continuity.


Research Report: Black Hat 2019 Hacker Survey Report

by ThycoticJan 21, 2020

Both hackers and security pros strongly agree that service accounts are an attractive target because hackers can easily elevate privileges and gain access to sensitive information. Yet one in three security pros say service account passwords are changed only after an incident or never rotated!


Research Report: 2020 IT Salary Report | How Do You Compare to Your Peers?

by Informa TechJan 16, 2020

Now is the time for you to create a new plan by evaluating what you earn, what you are worth, and where you want to grow. Download this report to help evaluate your value and worth in the IT professional job market for 2020.

InformationWeek surveyed full-time staff and management IT professionals employed in the United States with questions related to salaries, benefits, certifications, skills, and job satisfaction. The economy is strong, and U.S. IT professionals are reaping the


Webcast: Beyond Video Conferencing: Should You Record Every Meeting?

by PanoptoJan 15, 2020

The rapid growth in video conferencing creates a new set of opportunities and potential needs for the enterprise?from making meeting content searchable to satisfying potential new compliance requirements. In this webinar, we?ll explore why enterprises should consider making meeting recordings a standard part of the employee collaboration and communication experience.


Research Report: eSentire Annual Threat Intelligence Report: 2019 Perspectives and 2020 Predictions

by eSentireJan 15, 2020

Eliminate guesswork and get in-depth insights to navigate the ever-changing cybercrime landscape. This data-laden, incident-rich report delivers insider info on threat actors, their motivations, tactics and targets so you can make better informed security strategy decisions. Key insights include: Decade-old, state-funded espionage campaigns are still actively collecting from unwittingly compromised organizations Organized cybercrime is reaching new heights of social organization and role


eBook: Are SAST Tools Glorified Grep?

by Synopsys, IncJan 15, 2020

Even with a strong architecture and design, application code can still harbor vulnerabilities. Developers can make unintentional mistakes. Teams can also take shortcuts to achieve milestones or enhanced functionalities.

Static application security testing (SAST) is a form of white box . testing that discovers such vulnerabilities in an application's code. Using SAST tools to identify bugs early in the development life cycle reduces the time and cost of remediation.

This


eBook: Building security into the DevOps life cycle

by Synopsys, IncJan 15, 2020

The primary goal when breaking the build in the CI/CD DevOps life cycle is to treat security issues with the same level of importance as quality and business requirements. If quality or security tests fail, the continuous integration server breaks the build.

When the build breaks, the CI/CD pipeline also breaks. Based on the reason for the broken build, appropriate activities such as architecture risk analysis (ARA), threat modeling, or a manual code review are triggered.