Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Banking

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







Security and Intelligence with Ribbon Analytics

by Ribbon Communications Inc.Apr 03, 2019

Consolidate your Network Tools for Real-time Communications Security and Operations.


Understanding the Latest NIST Password Guidelines

by SpyCloudSep 05, 2019

Over the years, security professionals have learned surprising lessons about how password policies affect user behavior. Faced with complex requirements, people often take dangerous shortcuts.

To help organizations mitigate the risk posed by users' bad password habits, the National Institute of Standards and Technology (NIST) designed a set of password guidelines with human behavior in mind. Read this white paper from SpyCloud to understand what NIST's guidance means for your


Strategies for Minimizing Phishing Attack Risks

by ReversingLabsAug 09, 2019

The Phishing Attack Situation

There's no way around it. Sending emails with attachments, downloading web files and using shared folders are a part of how we conduct business and that's not going to change.

To hackers, these online communication modes are like highways into your network and they drive on them every day. It's why these paths are by far the largest source of malware attacks in general, and most important, malware that successfully evades defenses and makes its way


Darktrace Antigena: The Future of AI-Powered Autonomous Response

by DarktraceJun 18, 2019

This white paper will explore the critical challenges that security teams face in this new era of cyber-threat, and how Darktrace Antigena is leveraging AI to autonomously fight back against advanced attacks, giving human responders the critical time needed to catch up.


Autonomous Response: Threat Report 2019

by DarktraceJun 18, 2019

This report details seven case studies of attacks that were intercepted and neutralized by cyber defense AI, including insider threat, ransomware, and IoT attacks.


SANS Top New Attacks and Threat Report

by DomainToolsJul 23, 2019

Read this report to better understand the top new attacks and threats, gain deeper insight into cybersecurity trends on both the offensive and defensive sides, and get advice on steps enterprises must take to mitigate current and future risks.


Domino's Case Study

by SynackJul 16, 2019

Domino's needed a smart and efficient way to weave together their development and security operations in an agile environment. Leveraging Synack's dynamic crowdsourced security testing platform, Dominos got this and more.

For Domino's CISO Ethan Steiger, his main task is to protect the bottom line by preventing business downtime... and make sure customers' pizzas are delivered on time.

"Synack is changing the way we do penetration testing... Our developers know that their


Simulation vs. Pentesting vs. Vuln Scanning

by CymulateJul 08, 2019

How Targeted Cyberattack Simulations Differ from Penetration Tests & Vulnerability Scanning

The most effective way for an organization to test its resilience against the growing wave of cybercrime, is to opt for targeted attack simulations that use multi-vector simulated attacks. These kinds of simulations are also known as Breach & Attack Simulations (BAS). Gartner has asserted that, "Security testing is so challenging for technical professionals focused on security operations that


IDC SpotLight: Protecting Against Threats with Application Security Testing

by WhiteHat SecurityJul 03, 2019

Application security testing will play a major role in the next generation of security architecture. This IDC Technology Spotlight looks at the role of WhiteHat Security in the marketplace for application security testing solutions.


Know your Risk to Make Strategically Smart Decisions on Application Security

by WhiteHat SecurityJul 03, 2019

Web application security has become a critical issue for organizations of all sizes, and yet security organizations today are often understaffed for the job they're assigned to do. That's partly because there has been an explosion of web applications. In the past, an organization might need to scan its top five enterprise applications for vulnerabilities. Now organizations need to understand risk profiles for dozens, hundreds, or thousands of applications in production.

With the


SUBTOPICS:

Cymulate

With a Research Lab that keeps abreast of the very latest threats, Cymulate proactively challenges security controls against the full attack kill chain, allowing hyper-connected organizations to avert damage and stay safe. Cymulate's SaaS-based breach and attack simulation platform makes it simple to test, measure and optimize the effectiveness of your security controls any time, all the time. By mimicking the myriad of strategies and tools attackers deploy, businesses can assess their true preparedness to handle cybersecurity threats effectively.

Cymulate is trusted by companies worldwide, from small businesses to large enterprises, including leading banks and financial services. They share our vision-to make it easy for anyone to protect their company with the highest levels of security. Because the easier cybersecurity is, the more secure your company—and every company—will be.


Darktrace

Darktrace is the world's leading cyber AI company and the creator of Autonomous Response technology.

Its self-learning AI is modeled on the human immune system and used by over 3,000 organizations to protect against threats to the cloud, email, IoT, networks and industrial systems. This includes insider threat, industrial espionage, IoT compromises, zero-day malware, data loss, supply chain risk and long-term infrastructure vulnerabilities.

The company has over 900 employees, 40 offices and headquarters in San Francisco and Cambridge, UK. Every 3 seconds, Darktrace AI fights back against a cyber-threat, preventing it from causing damage.


DomainTools

DomainTools, the recognized leader in domain name research and monitoring tools, offers the most comprehensive searchable database of domain name registration, Whois records and hosting data for online investigations and research. Cyber security analysts, fraud investigators, domain professionals and marketers use DomainTools to investigate cybercrime, protect their assets and monitor online activity. DomainTools has 12 years of history on domain name ownership, Whois records, hosting data, screenshots and other DNS records. That's why customers say, "Every online investigation starts with DomainTools." DomainTools customers include many Fortune 1000 companies, leading vendors in the Security and Threat Intelligence community and most crime-fighting government agencies. Individual users can start with an online Free Trial available at http://www.domaintools.com. Enterprise accounts are available from http://www.domaintools.com/about/contact-us.


ReversingLabs

We have a simple mission: To use our experience and expertise from the security world to provide state of the art solutions for organizations to protect all their digital assets.


Ribbon Communications Inc.

Ribbon Communications Inc. (Nasdaq: RBBN) delivers market-leading software solutions that secure and power many of the world's leading service provider and enterprise communications environments. Built on world-class technology and intellectual property, the company's cloud-native solutions deliver intelligent and secure real-time communications solutions for the cloud, network and enterprise edge. Ribbon's Kandy Cloud real-time communications software platform delivers advanced and embedded CPaaS and UCaaS capabilities enabling service providers to rapidly create and deploy high-value communications services. With locations in more than 25 countries and on six continents, Ribbon's innovative, market-leading portfolio empowers service providers and enterprises with carrier-grade real-time communications solution, along with a new level of security that runs in their network infrastructure, data centers and private cloud, or in the public cloud.


SpyCloud

SpyCloud is the leader in account takeover (ATO) prevention, protecting billions of consumer and employee accounts either directly or through product integrations. Our award-winning solutions proactively defeat fraud attempts and disrupt the criminals' ability to profit from stolen information.


Synack

Synack, the most trusted crowdsourced security company, delivers comprehensive and continuous penetration testing with actionable results. The company combines the world's most skilled and trusted ethical hackers with AI-enabled technology to create a scalable, effective security solution. Headquartered in Silicon Valley with regional offices around the world, Synack protects leading global banks, federal agencies, DoD classified assets, and close to $1 trillion in Fortune 500 revenue. Synack was founded in 2013 by former US Department of Defense hackers Jay Kaplan, CEO, and Dr. Mark Kuhr, CTO.


WhiteHat Security

WhiteHat Security has been in the business of securing web applications for 17 years. Combining advanced technology with the expertise of its global Threat Research Center (TRC) team, WhiteHat delivers application security solutions that reduce risk, reduce cost and accelerate the deployment of secure applications and web sites. The company's flagship product, WhiteHat Sentinel, is a software-as-a-service platform providing dynamic application security testing (DAST), static application security testing (SAST), and mobile application security assessments. The company is headquartered in San Jose, Calif., with regional offices across the U.S. and Europe.