Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Banking

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







10-step Executive Action Plan for Collective Defense

by IronNet CybersecurityAug 04, 2020

A Collective Defense strategy — where companies, sectors, states, and nations collaborate on cyber defense as a united force — is providing a growing advantage against cyber attacks. This approach is quickly taking root. But how do you put Collective Defense into action?

In this eBook, you will learn: Key elements of Collective Defense Steps for preparing your organization Steps for leveraging advanced detection technologies Steps for collaborating for stronger defense


6 Misconceptions about Collective Defense for Cybersecurity

by IronNet CybersecurityAug 04, 2020

Representing all industries and sectors, we are standing at a historical inflection point in how we conduct cyber defense. In the face of highly sophisticated adversaries with nearly limitless time and resources, individual organizations no longer can defend sufficiently, nor should they have to with the technology now available to make Collective Defense possible.

To mount an effective and affordable defense, we have to defend as teams across sectors, cities, states, and nations.


Case Study: Tackling the Challenge Of Non-Employee Management

by SecZettaJul 31, 2020

Geisinger had addressed the need to manage the non-employee population by developing its own homegrown non-employee management solution. Over time, this solution had fallen victim to a common problem with in-house solutions: lack of resources to maintain the solution at an acceptable level. Geisinger needed an out-of-the-box non-employee management solution that could be implemented in a short time-frame. The solution needed to cover the complex requirements and multiple use-cases related to


Customer Case Study: Omada Health and ZenGRC

by ReciprocityJul 02, 2020

Omada Health, one of the largest digital healthcare companies in the world, needed to meet stringent personal health information (PHI) standards that spreadsheets just couldn't keep up with.

Download this case study to learn how Omada Health:

• Became the first digital health company to achieve certification with a number of security frameworks (including SOC 2)
• Manages the risks and vulnerabilities associated with vendors
• Stays compliant with


Case Study: Global Pharma and Reciprocity

by ReciprocityJun 24, 2020

A global pharmaceutical distributor had a very confusing and time-consuming risk management process. They struggled with manual tracking and management calling the process "awkward, confusing, and time-consuming."

Discover how the pharmaceutical distributor attained:
• Streamlined vendor risk management
• A central system of record
• Workflow automation

"We wouldn't be anywhere near where we are in our risk management program without ZenGRC."


Preparing For, Detecting, and Managing a Critical Data Breach

by Dark ReadingApr 06, 2020

There is one nightmare day that all IT and cybersecurity professionals dread: the discovery of a critical data breach. It?s potentially one of the most impactful ? yet least predictable -- days that your business will face. And, to a large extent, that impact will be determined by the decisions you make next. For the most experienced and effective cybersecurity teams, though, that ?really bad day? doesn?t come as a surprise. Such teams prepare for security incidents with tools for


Preparing For, Detecting, and Managing a Critical Data Breach

by Dark ReadingApr 06, 2020

There is one nightmare day that all IT and cybersecurity professionals dread: the discovery of a critical data breach. It?s potentially one of the most impactful ? yet least predictable -- days that your business will face. And, to a large extent, that impact will be determined by the decisions you make next. For the most experienced and effective cybersecurity teams, though, that ?really bad day? doesn?t come as a surprise. Such teams prepare for security incidents with tools for


The AI and Human Element Security Sentiment Study

by WhiteHat SecurityJun 03, 2020

How Two Powerful Forces Can Tackle Our Biggest Application Security Challenges

The "AI and Human Element Security Sentiment Study" is based on a survey of 102 industry professionals at the RSA Conference 2020. The research revealed that while over half of organizations use artificial intelligence (AI) or machine learning in their security stack, nearly 60 percent are still more confident in cyberthreat findings verified by humans over AI.

The survey responses, along with


Today's Non-Employee Lifecycle Management

by SecZettaJun 02, 2020

Today, managing the identity lifecycle for non-employees is an arduous and time-consuming process. From onboarding to auditing and verification to the removal of access on termination, the lack of centralized or complete information can leave your organization exposed to risk.

SecZetta provides purpose-built solutions that enable organizations to execute risk-based identity and lifecycle strategies for diverse non-employee populations. Manual processes are replaced with automated


WhiteHat and Bugcrowd Offer Pen Test Service

by WhiteHat SecurityJun 12, 2020

The WhiteHat Pen Test Service is a comprehensive application security testing bundle which includes WhiteHat's industry proven Sentinel Dynamic for complete web application security and Bugcrowd's unique crowdsourced pen test performed by their security experts to find high priority vulnerabilities and help organizations meet key compliance requirements.


SUBTOPICS:

Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


IronNet Cybersecurity

Since IronNet was founded in 2014, our mission has been to deliver the power of collective cybersecurity to defend companies, sectors, and nations so that people, companies, and nations can live and work with peace of mind in cyberspace. Today, organizations around the world turn to IronNet to detect known and unknown cyber threats targets in their networks and share that information with peers so that all members can collectively defend against that threat.


Reciprocity

Founded in 2009, Reciprocity has reimagined bulky legacy GRC software to meet the demands of today's dynamic data-driven ecosystem. The company is recognized for its forward-thinking cloud platform, ZenGRC, that elevates risk, compliance, and audit from a burdensome expense to a strategic advantage. Reciprocity has U.S. headquarters in San Francisco and global offices in Ljubljana, Slovenia, and Argentina.


SecZetta

SecZetta provides third-party identity risk solutions that enable organizations to execute risk-based identity access and lifecycle strategies for diverse non-employee populations. Our solutions are purpose-built to manage the dynamic relationships organizations have with non-employees in an easy-to-use application that helps facilitate commercial strategies, support regulatory compliance, and reduce third-party risk.


WhiteHat Security

WhiteHat Security has been in the business of securing web applications for 17 years. Combining advanced technology with the expertise of its global Threat Research Center (TRC) team, WhiteHat delivers application security solutions that reduce risk, reduce cost and accelerate the deployment of secure applications and web sites. The company's flagship product, WhiteHat Sentinel, is a software-as-a-service platform providing dynamic application security testing (DAST), static application security testing (SAST), and mobile application security assessments. The company is headquartered in San Jose, Calif., with regional offices across the U.S. and Europe.