Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Banking

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







Linking, Orchestrating, and Managing Your Enterprise Security Systems

by ReliaQuest LLCJan 06, 2020

Over the years, most enterprises have purchased and installed a wide variety of security tools and technologies, from security gateways to firewalls to malware detection systems. Individually, they all solve a problem - but they often can't work together or speak a common language. In this webinar, experts will discuss methods and technologies for linking and integrating disparate security systems to provide a more comprehensive view of security threats - and a more structured data defense.


Ransomware Defense for Dummies - 2nd Edition

by Cisco UmbrellaJan 31, 2020

Updated for 2020, the 2nd edition of Cisco Umbrella's popular Ransomware Defense for Dummies eBook explores the top cyber security best practices to reduce ransomware risks.

Ransomware Defense for Dummies consists of 5 short chapters that explore:

• How it operates and its defining characteristics
• Cyber security best practices to reduce risk
• A new best-of-breed network security architecture
• The Cisco Ransomware Defense solution
• Important


The Role of Predictive Intelligence in the Fight Against Cyberattacks

by Cisco UmbrellaJan 31, 2020

Traditional threat intelligence is reactive, basing security on information gathered only after an attack is successfully carried out. With threats increasing in sophistication and speed, you need intelligence that can learn from internet activity patterns, automatically identify attacker infrastructure being staged for the next threat, and block those threats before they have the chance to attack your organization. Download this white paper to learn how a predictive intelligence can aid in the


How Enterprises Are Developing and Maintaining Secure Applications

by Dark ReadingJan 30, 2020

One of the most common ways cybercriminals breach enterprises is by finding security vulnerabilities in the applications they use. Yet, with the skyrocketing speed of application development, many enterprises still struggle to build security into their software and eliminate dangerous flaws that might lead to data breaches. And most have experienced such severe security troubles with one application that they've simply migrated to a different one altogether.

In this 2020 Dark Reading


Service Account Security for Dummies eBook

by ThycoticJan 21, 2020

Get control of service account sprawl and develop a strategy to properly protect and secure service account access to lock down your privileged account attack surface. Learn about service account governance and day-to-day best practices, and the key criteria for managing them with automated cyber security tools.


2019 State of Privileged Access Management (PAM) Maturity Report

by ThycoticJan 21, 2020

With up to 80 percent of breaches due to compromised credentials, more organizations than ever before are prioritizing privileged account protection. Thycotic's "State of PAM Maturity" report highlights the disturbing results based on more than 450 responses worldwide to our online PAM Maturity Assessment.

See the three major key takeaways from the survey and recommendations for action in the complete 2019 State of Privileged Access Management (PAM) Maturity Report.
85% are still


Privileged Account Incident Response Template

by ThycoticJan 21, 2020

Thycotic's free Privileged Account Incident Response template is designed to prevent a cyber breach from becoming a cyber catastrophe. It helps IT operations, security and incident response teams form a united front against an attack to coordinate actions and maintain business continuity.


Black Hat 2019 Hacker Survey Report

by ThycoticJan 21, 2020

Both hackers and security pros strongly agree that service accounts are an attractive target because hackers can easily elevate privileges and gain access to sensitive information. Yet one in three security pros say service account passwords are changed only after an incident or never rotated!


eSentire Annual Threat Intelligence Report: 2019 Perspectives and 2020 Predictions

by eSentireJan 15, 2020

Eliminate guesswork and get in-depth insights to navigate the ever-changing cybercrime landscape. This data-laden, incident-rich report delivers insider info on threat actors, their motivations, tactics and targets so you can make better informed security strategy decisions. Key insights include: Decade-old, state-funded espionage campaigns are still actively collecting from unwittingly compromised organizations Organized cybercrime is reaching new heights of social organization and role


Are SAST Tools Glorified Grep?

by Synopsys, IncJan 15, 2020

Even with a strong architecture and design, application code can still harbor vulnerabilities. Developers can make unintentional mistakes. Teams can also take shortcuts to achieve milestones or enhanced functionalities.

Static application security testing (SAST) is a form of white box testing that discovers such vulnerabilities in an application's code. Using SAST tools to identify bugs early in the development life cycle reduces the time and cost of remediation.

This


SUBTOPICS:

Cisco Umbrella

Avoid the aftermath with a before strategy. Cisco Umbrella is a cloud security platform that provides the first line of defense against threats on the internet wherever users go.


Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


eSentire

eSentire is the largest pure-play Managed Detection and Response (MDR) service provider, keeping organizations safe from constantly evolving cyber-attacks that technology alone cannot prevent. Its 24x7 Security Operations Center (SOC), staffed by elite security analysts, hunts, investigates, and responds in real-time to known and unknown threats before they become business-disrupting events. Protecting more than $6 trillion in corporate assets, eSentire absorbs the complexity of cybersecurity, delivering enterprise-grade protection and the ability to comply with growing regulatory requirements.


Thycotic

Headquarters: Washington DC

Thycotic is the leading provider of cloud-ready privilege management solutions. Thycotic's security tools empower over 10,000 organizations, from small businesses to the Fortune 500, to limit privileged account risk, implement least privilege policies, control applications, and demonstrate compliance. Thycotic makes enterprise-level privilege management accessible for everyone by eliminating dependency on overly complex security tools and prioritizing productivity, flexibility and control. Headquartered in Washington, DC, Thycotic operates worldwide with offices in the UK and Australia.