Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Banking

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







2022 Unit 42 Incident Response Report

by Palo Alto Networks I Unit 42Oct 04, 2022

Last year, ransomware and business email compromise (BEC) accounted for approximately 70% of Unit 42 incident response cases.

Download the "2022 Unit 42 Incident Response Report" to better understand current threat trends, gaining insights into: The most prevalent cybercriminal tactics. Which industries were the most affected. What contributes to attackers' success. Top cybersecurity predictions from our incident responders. Actionable recommendations to get ahead of


Transform Your Security Strategy

by Palo Alto Networks I Unit 42Oct 04, 2022

By understanding the threat landscape and analyzing the threats most relevant to your organization, you can take preventative steps to make better security decisions and limit the damage.

Read the eBook to understand: Why a threat-informed approach facilitates better business decisions. The benefits of building a cyber resilience roadmap while staying up to date with the evolving threat landscape. How a solid incident response plan helps avoid panic during an attack.


Digital Brand Protection for Financial Institutions

by BlueVoyantOct 28, 2022

From online banking websites to mobile apps, these crucial parts of financial institutions are also easy targets. How can you start taking a proactive approach to protect your customers' assets and your brand?

Download this eBook to learn: Common cyber attacks used by today's threat actors against financial services institutions How threat actors gain access to phishing and spoofing kits The advantage of establishing a proactive approach to phishing and spoofing campaigns


Dynamic DNS Infrastructure: The Phisher's Cheat Code

by BlueVoyantOct 28, 2022

Dynamic DNS Infrastructure providers offer free dynamic DNS services and host thousands of active subdomains at any given moment. It is highly active — with threat actors using it to target the largest U.S. financial institutions via phishing websites.

Download this report to learn: The methods threat actors use to orchestrate phishing attempts Evasion mechanisms phishers employ to go undetected How to use this information to understand emerging threats in real time


How Enterprises Are Attacking the Cybersecurity Problem Report

by Dark ReadingNov 01, 2022

Data breaches and heightened worries over software supply chain threats and cloud vulnerabilities were major drivers of enterprise cybersecurity initiatives over the past year. Security decision-makers prioritized projects to reduce their organizations' exposure to attacks via these vectors even as they maintained a steady focus on mitigating phishing, malware, and other end-user threats. Download the latest report from Dark Reading: How Enterprises Are Attacking the Cybersecurity Problem to


Endpoint Security Buyers Guide

by SophosOct 07, 2015

See how the different security vendors stack up. Get an overview of endpoint security features, and capabilities, including next-gen technologies. Compare the leading vendors including Sophos, Symantec, McAfee, Kaspersky, Microsoft, Bitdefender, Trend Micro, SentinelOne, and CrowdStrike. See a summary of analyst reports from Gartner, Forrester, SE Labs, MRG Effitas, and AV Comparables.


Extended Detection and Response (XDR) - Beginner's Guide

by SophosOct 05, 2021

XDR (Extended Detection and Response) is a very hot topic in the cybersecurity world. Going beyond the endpoint and server to incorporate firewall, email and other data sources into your IT operations and threat hunting tasks is more important than ever before.

But what exactly is XDR? How can it benefit your organization? And how is it different from Endpoint Detection and Response (EDR)?

Read this beginner's guide for an introduction to Extended Detection and Response. It


Sophos 2022 Threat Report

by SophosJan 13, 2022

As we move into 2022, ransomware shows no signs of slowing down — that's no surprise. What we have seen in the past 18 months, however, is a shift in tactics: targets have shifted to ever-larger organizations, and the business model that dictates how ransomware attacks occur has evolved. It's up to IT professionals to proactively deal with these trends to meet the challenges just on the horizon and beyond. In this report you'll find: The future of ransomware The impact of


Global third-party risk management survey 2022

by DeloitteSep 28, 2022

This annual Third Party Risk Management (TPRM) report for 2022 features survey results revealing how organizations are responding to increasing expectations related to 5 key areas.

Discover key findings in the following areas: Addressing ESG risks Managing third-party resilience Integrated/holistic third-party management External assistance and managed service solutions Key post-pandemic TPRM trends


See Jane Secure

by OptivOct 12, 2022

You may have more than one — the employee who is a constant security disrupter. What can you do? Follow the actions Jane took to secure her organization and create a culture of cybersecurity awareness — with Optiv's help.


SUBTOPICS:

BlueVoyant

BlueVoyant combines internal and external cyber defense capabilities into an outcomes-based platform called BlueVoyant Elements®. Elements is cloud-native and continuously monitors your network, endpoints, attack surface, and supply chain plus the clear, deep, and dark web for vulnerabilities, risks, and threats; and takes action to protect your business, leveraging both machine learning-driven automation and human-led expertise. Elements can be deployed as independent solutions or together as a full-spectrum cyber defense platform. BlueVoyant's approach to cyber defense revolves around three key pillars — technology, telemetry, and talent — that deliver industry leading cybersecurity defense capabilities to more than 700 customers across the globe.


Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


Deloitte

Deloitte Cyber & Strategic Risk offers a unified approach to help you confidently tackle obstacles, build new capabilities, and move forward fast. Leverage our portfolio's breadth and depth to transform your organization knowing Deloitte has your back wherever you are on your journey.


Optiv

Headquarters: Denver, CO

Optiv is the cyber advisory and solutions leader, delivering strategic and technical expertise to more than 7,000 companies across every major industry. We partner with organizations to advise, deploy and operate complete cybersecurity programs from strategy and managed security services to risk, integration and technology solutions. With clients at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can. At Optiv, we manage cyber risk so you can secure your full potential. 


Palo Alto Networks I Unit 42

Palo Alto Networks Unit 42™ brings together world-renowned threat researchers, elite incident responders, and expert security consultants to create an intelligence-driven, response-ready organization that's passionate about helping you proactively manage cyber risk. Together, our team serves as your trusted advisor to help assess and test your security controls against the right threats, transform your security strategy with a threat-informed approach, and respond to incidents in record time so that you get back to business faster.


Sophos

Sophos evolves to meet every new challenge, protecting more than 400,000 organizations of all sizes in more than 150 countries from today's most advanced cyber threats. Powered by SophosLabs, our cloud-native and AI-enhanced solutions are able to adapt and evolve to secure endpoints and networks against never-before-seen cybercriminal tactics and techniques. Managed through our award-winning, cloud-based platform, Sophos Central, our best-of-breed products work together through our unique Synchronized Security system to share threat intelligence and respond to evolving threats. The Sophos suite of products secures networks and endpoints against automated and active-adversary breaches, ransomware, malware, exploits, data exfiltration, phishing, and more.