Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.



Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...


2020: Threats in Review

by DarktraceDec 14, 2020

The sudden and unforeseen transition to remote and hybrid working at the start of 2020 has had profound implications on the cyber-threat landscape. This report explores the key threat trends that emerged as a result: SaaS account takeover Email 'fearware' attacks A resurgence in server-side attacks Continued rise of ransomware Discover eight cyber-attacks that evaded other security tools but were caught in real time by Darktrace AI.

The 2020 Duo Security Trusted Access Report

by Duo SecurityJan 07, 2021

Duo Security's annual Trusted Access report focuses on remote access, analyzing findings from 26 million devices, across more than 500,000 applications and over 700 million authentications per month. With more people working from home than ever, organizations across the globe must ask themselves how employees can access all their applications without exposing themselves to risk and ensure that users keep their operating systems and software up to date. The 2020 report addresses these questions

From MFA to Zero Trust

by Duo SecurityJan 07, 2021

A zero-trust security model can help you secure against threats such as phishing, stolen credentials and out-of-date devices that may be vulnerable to known exploits and malware. To secure the workforce, you need to verify the identity of the user and ensure the security of their device before granting access to only the applications they need. This guide covers the pillars of Zero Trust and lays out a practical approach in five phases for implementing Zero Trust for the Workforce.

Full Body Exposure: CybelAngel Analysis of Medical Data Leaks

by CybelAngelDec 23, 2020

CybelAngel conducted a 6 month investigation into Network Attached Storage (NAS) and Digital Imaging and Communications in Medicine (DICOM), the de facto standard used by healthcare professionals to send and receive medical data. The discovery? More than 45 million medical imaging files — including X-rays, and CT scans - along with personal healthcare info freely accessible on unprotected servers.

Learn about DICOM protocol and PACS server vulnerabilities, and how to stop

Enable and Protect Your Remote Workforce

by AT&T CybersecurityDec 17, 2020

This white paper is intended to help you make smart, strategic decisions on the tools and services available to bolster cybersecurity readiness in a remote environment, covering:

• Cybersecurity risks for remote workers
• Challenges of security for remote access
• Helping a new remote workforce withstand cybersecurity risks
• What to look for in remote security solutions

Download today to take a holistic approach to help protect your

2020: The Year in Security

by Dark ReadingNov 19, 2020

COVID-19 upended the security world in 2020. With employees moving to remote home offices, organizations were forced to enhance their endpoint security, while many were facing tighter budgets amid a pandemic-ailing economy. This new normal also emboldened cybercriminals to pivot their attacks to remote workers, targeting virtual private networks and collaboration platforms such as Zoom, and waves of coronavirus-related spam and phishing lures.

Download Dark Reading's Tech Digest 2020:

Digital Transformation & Cyber Risk: What You Need to Know to Stay Safe

by CyberGRXSep 23, 2020

Digital transformation is the use of technologies to improve operations and customer relationships. CyberGRX and Ponemon Institute surveyed 581 IT security and 302 C-suite executives to determine what impact digital transformation is having on cybersecurity and how prepared organizations are to deal with that impact.

The results show that while digital transformation is widely accepted as critical, the rapid adoption of it is creating significant vulnerabilities for most organizations

Gartner Critical Capabilities for IT Vendor Risk Management Tools

by CyberGRXSep 23, 2020

With the Gartner Critical Capabilities for IT Vendor Risk Management Tools report now. You'll be able to see how IT Vendor Risk Management solution providers were scored across key functional areas, as well as how Gartner scores CyberGRX highest in VRM Solution and Vendor Risk Assessment Data use case.

Third Party Cyber Risk Management Guide 101

by CyberGRXSep 23, 2020

As organizations go through Digital Transformation, their ecosystems become larger and more vulnerable to third-party cyber risk. Implementing an effective third-party cyber risk management (TPCRM) program is essential to securing your organization's cyber ecosystem by tracking, avoiding, and minimizing the risks that you're exposed to. Get the TPCRM 101 guide to learn more.

A Force Multiplier for Third-Party Cyber Risk Management

by CyberGRXSep 23, 2020

With a rapidly growing business that includes a robust vendor ecosystem and portfolio of companies, Blackstone needed a force multiplier that would help them create an efficient, effective and scalable third-party cyber risk management program. Read the case study to learn how CyberGRX helped.


AT&T Cybersecurity

AT&T Cybersecurity helps make your network more resilient. Together, the power of the AT&T network, or SaaS-based solutions with advanced technologies including virtualization and actionable threat intelligence from AT&T Alien Labs and the Open Threat Exchange™, and our relationship with more than 40 best-of-breed vendors, accelerate your response to cybersecurity threats. Our experienced consultants and SOC analysts help manage your network transformation to reduce cybersecurity risk and overcome the skills gap. Our mission is to be your trusted advisor on your journey to cybersecurity resiliency, making it safer for your business to innovate.


CybelAngel reduces global enterprise digital risk by detecting critical data leaks outside the firewall before these leaks become major data breaches. Leveraging its Augmented Intelligence, a unique combination of proven machine learning capabilities and superior cyber analysts, CybelAngel analyzes billions of data sources, files, and threats across all layers of the internet to discover critical data leaks for their customers. Global organizations rely on CybelAngel every day to detect critical data leaks before wreaking havoc on their business.


CyberGRX provides enterprises and their third parties with the most cost-effective and scalable approach to third-party cyber risk management today. Built on the market's first third-party cyber risk Exchange, CyberGRX arms organizations with a dynamic stream of third-party data and advanced analytics helping organizations efficiently manage risk in their partner ecosystems. Based in Denver, CO, CyberGRX was designed with partners including Aetna, Blackstone and MassMutual.

Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


Darktrace is the world's leading cyber AI company and the creator of Autonomous Response technology. Its self-learning AI is modeled on the human immune system and used by over 3,000 organizations to protect against threats to the cloud, email, IoT, networks and industrial systems.

The company has over 1,000 employees and headquarters in San Francisco and Cambridge, UK. Every 3 seconds, Darktrace AI fights back against a cyber-threat, preventing it from causing damage.

Duo Security

Duo Security, now part of Cisco, is the leading multi-factor authentication (MFA) and and secure access provider. Duo comprises a key pillar of Cisco Secure™s Zero Trust offering, the most comprehensive approach to securing access across IT applications and environments, from any user, device, and location. Duo is a trusted partner to more than 25,000 customers globally, including Bird, Facebook, Lyft, University of Michigan, Yelp, Zillow and more. Founded in Ann Arbor, Michigan, Duo also has offices in Austin, Texas; San Francisco, California; and London. Try it for free at