Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.



Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...


Ransomware Security Breach Summary: Food Production

by CBTSMay 03, 2021

Within minutes of being alerted to the anomalous activity in the client's environment, the CBTS security and operation team notified the client and immediately began to assess, contain, and mitigate the damage. CBTS brought the full weight of our experience and skill sets to help restore more than 140 production servers, and databases, as well as active directory, network, and remote desktop services.

Legal Team’s Role in Investigating and Responding to a Data Breach

by AccessData, an Exterro CompanyApr 20, 2021

This white paper outlines the critical role of in-house legal in helping organizations effectively collaborate to manage post-breach investigations and minimize the damage—from the initial identification and investigation, through reporting findings and learning from the incident.

Download this paper to learn where Legal fits in the following categories: Planning for incident response Responding to a breach The post-breach response and investigation

Incident Response Comes to the Cloud: 3 Reasons to Choose an IaaS Solution

by AccessData, an Exterro CompanyApr 23, 2021

Given the recent spike in employees working from home, organizations have been forced to move their data and communications to the cloud via Google Drive, Microsoft Teams, and other cloud applications. However, information security teams still need to conduct investigations, respond to incidents and be able to access, collect and analyze data that is being stored in the cloud and on cloud data sources.

Download this white paper to learn the 3 advantages of conducting IR in the cloud

Mapping Attack Surface Management to PCI DSS Compliance

by CensysApr 19, 2021

See how the Censys Attack Surface Management (ASM) Platform helps support specific components of PCI DSS version 3.2.1 compliance and how we assist in iterative and systematic risk assessments for PCI DSS compliance.

Download the Guide How the Censys ASM Platform maps to specific PCI DSS version 3.2.1 requirements Features in the Censys ASM Platform that assist in iterative and systematic risk assessments for PCI DSS compliance and beyond. How to put PCI DSS compliance in

Cloud Misconfiguration Mayhem

by CensysApr 23, 2021

Misconfiguration of the cloud is the #1 cause of cloud-based data breaches as Cited by Gartner. Our team started investigating and compiling data in March 2021 from a dozen popular cloud providers in the industry, including the 2020 Gartner Magic Quadrant Cloud Providers.

Key Findings Our research identified nearly 2M database exposures across cloud providers. We found more than 1.9M RDP exposures across the dozen cloud providers we investigated. Users of OVH were more likely

Get Continuous Visibility to Active Directory Exposures and Live Attacks

by Attivo NetworksApr 23, 2021

Active Directory is a Microsoft product consisting of several services to administer permissions and access to networked resources on a Windows Network. Because it's the primary source of information for all enterprise resources and seamlessly integrates business applications, it's a high-value target for attackers.

Download this report to find out how you can achieve ongoing visibility into critical domain, computer, and user-level exposures and monitoring of Active Directory for

Build an Active Defense Strategy with MITRE Shield and Deception Technology

by Attivo NetworksApr 23, 2021

The MITRE Shield matrix lists capabilities that help an enterprise to change an attack engagement from a defensive play to an offensive play. These range from basic defensive capabilities to cyber deception and adversary engagement operations. In this paper, Attivo evaluates the ThreatDefend® platform against all Active Defense techniques and use cases documented per technique by the MITRE Shield knowledge base to illustrate its comprehensive coverage.

Cybersecurity Risk Management

by InformationWeekFeb 10, 2021

The shared responsibility model of cloud computing means companies are responsible for securing their cloud-based data, apps and infrastructure. But since not every workload demands the highest level of security, how do you balance risk tolerance and cost? This virtual trade show will highlight the latest strategies, tools and research to help you develop the right cybersecurity risk strategy for your business.

Cyber Risk Management Worksheet

by Palo Alto Networks | Unit 42Apr 21, 2021

View this worksheet to determine the current maturity level of your organization and take the cyber risk assessment to identify organizational strengths, weaknesses, and opportunities.

Unit 42 2021 Ransomware Threat Report

by Palo Alto Networks | Unit 42Apr 21, 2021

Read the 2021 Ransomware Threat Report to better understand threats, trends and ransomware tactics.


AccessData, an Exterro Company

Whether it's for investigation, litigation or compliance, AccessData, now an Exterro Company, offers industry-leading solutions that put the power of forensics in your hands. For more than 30 years, AccessData has worked with more than 130,000 clients in law enforcement, government agencies, corporations, service providers and law firms around the world to understand and focus on their unique collection-to-analysis needs. The result? Products that empower faster results, better insights, and more connectivity.

Faster insights, trusted answers and better results. Our proven approach to forensics gives you infinite benefits, no matter what the challenge.

Attivo Networks

Attivo Networks®, the leader in lateral movement attack detection and privilege escalation prevention, delivers a superior defense for countering threat activity. Through cyber deception and other tactics, the Attivo ThreatDefend® Platform offers a customer-proven, scalable solution for denying, detecting, and derailing attackers and reducing attack surfaces without relying on signatures. The portfolio provides patented innovative defenses at critical points of attack, including at endpoints, in Active Directory, in the cloud, and across the entire network by preventing and misdirecting attack activity. Forensics, automated attack analysis, and third-party integrations streamline incident response. Deception as a defense strategy continues to grow and is an integral part of NIST Special Publications and MITRE® Shield, and its capabilities tightly align to the MITRE ATT&CK® Framework. Attivo has won over 130 awards for its technology innovation and leadership.


With deep capabilities across security, data, network, voice, managed services, monitoring and management, CBTS covers your technology needs with end-to-end expertise and is dedicated to driving business outcomes.


Censys was started as a research project at the University of Michigan by the creators of ZMap and inventors of fast Internet-wide scanning. Today, Censys, Inc. is led by a team of industry and academic security and networking leaders, and provides both best-in-class Internet data and Attack Surface Management.

Learn more about Censys at


InformationWeek is the leading multimedia Business Technology brand providing CIOs and IT decision makers with unique perspective and tools that work in lock step with their decision making process - from the setting of business strategies to the evaluation and recommendation of technology solutions. Through its cross-media platform, which includes online sites, magazine, events and research, InformationWeek provides editorial content developed by both journalists and CIO and IT peers delivered when and how they want it, 24/7. The InformationWeek audience of more than 2 million buyers includes CIOs, IT executives and business managers who span across industries, job titles, company sizes and global borders.

Palo Alto Networks | Unit 42

Unit 42 brings together an elite group of cyber researchers and incident responders to protect our digital way of life. With a deeply rooted reputation for delivering industry-leading threat intelligence, Unit 42 has expanded its scope to provide state-of-the-art incident response and cyber risk management services. Our consultants will serve as trusted partners to rapidly respond to and contain threats so you can focus on your business.