Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Banking

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







Risk-Based Vulnerability Management: The Best Way to Prioritize

by TenableJun 05, 2020

Everyone in security knows that there are no guarantees against breaches, so a proactive defensible approach is the next best thing. The easiest way to do that? Risk-based vulnerability management. Download this whitepaper to learn how to prioritize the real threats to the business.


SANS Whitepaper: Practical Industrial Control System Cybersecurity

by TenableJun 05, 2020

Based on a recent Industrial IoT security conducted by SANS, the use and benefits derived from information technology (IT) and operational technology (OT) convergence are growing and enabling more effective management and operation of contemporary control systems.

This paper explores the issues that arise with the blending of IT and OT where risk must be identified and managed. Download this whitepaper to learn how to make more informed decisions about how to build stronger cybersecurity


Headline Vulnerabilities: How Media Coverage Shapes the Perception of Risk

by TenableJun 05, 2020

Newsworthy vulnerabilities can become a reputational and customer service issue for organizations if and when they are exploited. Read this report to hear what chief information security officers (CISOs) and security analysts had to say about whether and how media coverage of vulnerabilities impacted their work.


Case Study: Validating Security & Reducing Risk

by MandiantMay 29, 2020

The case study explores how one of the largest healthcare providers in the U.S. validates security protocols and protects critical assets with an effective security validation program that utilizes automation and an intelligence-driven approach to mitigate risk, optimize controls, and communicate value.

This case study and accompanying video covers: The challenges of cybersecurity for healthcare organizations Measuring and monitoring the efficacy of security tools Reducing cyber risk


Case Study: Continuously Validate Cybersecurity Controls

by MandiantMay 15, 2020

Are you able to get evidence-based data to show progress and improvements in your cybersecurity strategy?

Read this case study to understand how Mandiant Security Validation (formerly Verodin), empowers leading financial services organization Torchmark Corporation to continuously validate cybersecurity controls and realize improvements in key areas such as: People and process conditioning Communicating the effectiveness of security controls Real-time insights into environmental drift


Simplify InfoSec Risk and Compliance

by ReciprocityApr 30, 2020

Managing risk, compliance, and audit processes is complex and resource intensive. Without a centralized platform, audit cycles are longer, visibility into overall risk posture is lacking, and reporting is inefficient. Many companies delay implementing a GRC solution, fearing it to be too costly or challenging--but it doesn't have to be.

Download this whitepaper to learn how you can:
• Automate evidence collection
• Reduce manual effort and shorten audit cycles


Supercharging SIEM Solutions With Threat Intelligence

by Recorded FutureApr 20, 2020

Security information and event management (SIEM) technologies are essential tools for security operations teams to collect, correlate, and analyze security event logs across their network environments.

But every organization's attack surface is growing these days. For SIEM users, that's creating some big challenges, such as an information overload from too many alerts and the need to do additional, painstaking manual research to make up for a lack of context in sources of information


2020 SANS Cyber Threat Intelligence (CTI) Survey

by Recorded FutureApr 20, 2020

Organizations of all sizes are embracing intelligence as a critical security function to expose unknown threats, inform better decisions, and accelerate risk reduction.

This new survey from the SANS Institute explores how cyber threat intelligence has evolved over the last year. Download the results to examine current trends and find out: How to measure your intelligence program's effectiveness Which processes and tools best support collaborative CTI efforts What types of


Security Intelligence: Driving Security From Analytics to Action

by Recorded FutureApr 20, 2020

To drive down risk while achieving meaningful operational outcomes, intelligence must be embedded into the core of every security workflow, function, and decision. This requires a unified approach for collecting, analyzing, and automating data and insights.

At Recorded Future, security intelligence is more than a methodology - it's a mindset, a philosophy for empowering their clients with the intelligence necessary to drive every security initiative and strategic decision.


10 Critical Issues to Cover in Your Vendor Security Questionnaire

by PanoraysApr 17, 2020

Companies must carefully check their vendors' cyber posture, and the initial vetting of any third party usually begins with a comprehensive security questionnaire. What are the key questions that must be addressed to determine if vendors have a strong cyber posture?

Download this guide to learn the most important ones to consider, including: Does customer data leave the vendor's production systems? Does the vendor support single sign-on? Does the vendor have an employee security


SUBTOPICS:

Mandiant

Today's business world requires security validation. Without data-driven evidence that validates security effectiveness, companies operate on assumptions and are at risk of an attack. Through automated, continuous monitoring and measurement against real-world attack behaviors, Mandiant Security Validation (formerly Verodin) enables organizations to achieve optimal cybersecurity performance through ongoing assessment, optimization and rationalization.


Panorays

Panorays automates third-party security lifecycle management.

With the Panorays platform, companies dramatically speed up their third-party security evaluation process and gain continuous visibility while ensuring compliance to regulations such as GDPR, CCPA and NYDFS.

It is the only platform that enables companies to easily view, manage and engage on the security posture of their third parties, vendors, suppliers and business partners.


Reciprocity

Founded in 2009, Reciprocity has reimagined bulky legacy GRC software to meet the demands of today's dynamic data-driven ecosystem. The company is recognized for its forward-thinking cloud platform, ZenGRC, that elevates risk, compliance, and audit from a burdensome expense to a strategic advantage. Reciprocity has U.S. headquarters in San Francisco and global offices in Ljubljana, Slovenia, and Argentina.


Recorded Future

Recorded Future arms security teams with the only complete security intelligence solution powered by patented machine learning to lower risk. Our technology automatically collects and analyzes information from an unrivaled breadth of sources and provides invaluable context in real time and packaged for human analysis or integration with security technologies.


Tenable

Tenable Network Security provides continuous network monitoring to identify vulnerabilities, reduce risk and ensure compliance. Tenable Network Security's family of products includes SecurityCenter Continuous View and Nessus.