Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Banking

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







API Security 101 Whitepaper

by Noname SecurityJan 25, 2022

APIs are everywhere in the modern IT world, and the volume of API traffic is only expected to grow. However, despite the power and popularity of APIs, many organizations struggle with API security. When it comes to securing APIs, traditional application security controls are not a complete solution.

In this API security white paper, we will cover: APIs as a widely adopted integration tool Two elements needed to deliver APIs API security challenges (even those different than


Cyber Attack Simulations vs Pen Testing vs Vulnerability Scanning

by CymulateMay 18, 2022

Between Pen-Testing, Vulnerability Scanning and cyber attack simulations, only one provides the proper education your team needs to prevent attackers from gaining an initial foothold. How else can cyber attack simulations minimize risk? Read the comparison here.


[Slideshow] 10 Mistakes End Users Make That Drive Security Managers Crazy

by Dark ReadingApr 27, 2018

We pinpointed 10 common ways employees mishandle - and inadvertently breach - an organization's security. Find out what they are here.


[Slideshow] 7 Key Stats that Size Up the Cybercrime Deluge

by Dark ReadingApr 27, 2018

Now that we've got a couple of months from this year in the rearview mirror, security researchers have had enough time to crunch the numbers from 2017. That means a raft of new reports analyzing last year's cybersecurity data with updated telemetry on the threat landscape, economic impact, and defense problems facing the cybersecurity industry. Here are some of the most illuminating highlights.


[Slideshow] 7 Steps to a Smooth, Secure Cloud Transition

by Dark ReadingApr 27, 2018

If you're thinking with a cloud-first mindset, you should be making sure all the right boxes are checked before you make the leap. Here, security experts highlight the most important steps to keep in mind while moving to the cloud. Find out what they had to say.


[Strategic Security Report] Assessing Cybersecurity Risk

by Dark ReadingJun 30, 2017

As cyber attackers become more sophisticated and enterprise defenses become more complex, many enterprises are faced with a complicated question: what is the risk of an IT security breach? This report, one of three to come out of Dark Reading's annual Strategic Security Survey, delivers insight on how today's enterprises evaluate the risks they face. In addition to providing survey data on the implementation of risk metrics and best practices, this report offers a look at security professionals'


[Strategic Security Report] Navigating the Threat Intelligence Maze

by Dark ReadingDec 15, 2017

Over the past few years, enterprises have gained access to vast new resources of information about cybersecurity threats. New services that collect information about external threats are being combined with existing technologies for analyzing security events. Enterprises are better able to assess potential threats by correlating data from multiple sources to measure risk and prioritize defenses. How are organizations harnessing these new information resources? In this survey, IT security


10 Critical Issues to Cover in Your Vendor Security Questionnaire

by PanoraysApr 17, 2020

Companies must carefully check their vendors' cyber posture, and the initial vetting of any third party usually begins with a comprehensive security questionnaire. What are the key questions that must be addressed to determine if vendors have a strong cyber posture?

Download this guide to learn the most important ones to consider, including: Does customer data leave the vendor's production systems? Does the vendor support single sign-on? Does the vendor have an employee security


10 Emerging Threats Every Enterprise Should Know About

by Dark ReadingAug 13, 2018

This Dark Reading's August Tech Digest explores ten emerging security threats to enterprise data.

IN THIS REPORT: 10 Emerging Threats Every Enterprise Should Know About Trading Platforms Riddled with Severe Flaws Cracking Cortana: The Dangers of Flawed Voice Assistants Demystifying Mental Health in the Infosec Community New Hack Weaponizes the Web Cache


10-step Executive Action Plan for Collective Defense

by IronNet CybersecurityAug 04, 2020

A Collective Defense strategy — where companies, sectors, states, and nations collaborate on cyber defense as a united force — is providing a growing advantage against cyber attacks. This approach is quickly taking root. But how do you put Collective Defense into action?

In this eBook, you will learn: Key elements of Collective Defense Steps for preparing your organization Steps for leveraging advanced detection technologies Steps for collaborating for stronger defense


SUBTOPICS:

Cymulate

For companies that want to manage their security posture against the evolving threat landscape: Cymulate SaaS-based Extended Security Posture Management (XSPM) deploys within an hour, enabling security professionals to continuously challenge, validate and optimize their cyber-security posture end-to-end across the MITRE ATT&CK® framework.

The platform provides out-of-the-box, expert, and threat intelligence-led risk assessments that are simple to deploy and use for all maturity levels, and constantly updated. It also provides an open framework to create and automate red and purple teaming by generating penetration scenarios and advanced attack campaigns tailored to their unique environments and security policies. Cymulate allows professionals to manage, know and control their dynamic environment.


Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


IronNet Cybersecurity

Since IronNet was founded in 2014, our mission has been to deliver the power of collective cybersecurity to defend companies, sectors, and nations so that people, companies, and nations can live and work with peace of mind in cyberspace. Today, organizations around the world turn to IronNet to detect known and unknown cyber threats targets in their networks and share that information with peers so that all members can collectively defend against that threat.


Noname Security

Noname Security is the only company taking a complete, proactive approach to API Security. Noname works with 20% of the Fortune 500 and covers the entire API security scope across three pillars — Posture Management, Runtime Security, and Secure API SDLC. Noname Security is privately held, remote first with headquarters in Palo Alto, California, and an office in Tel Aviv and Amsterdam.


Panorays

Panorays automates third-party security lifecycle management.

With the Panorays platform, companies dramatically speed up their third-party security evaluation process and gain continuous visibility while ensuring compliance to regulations such as GDPR, CCPA and NYDFS.

It is the only platform that enables companies to easily view, manage and engage on the security posture of their third parties, vendors, suppliers and business partners.