Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Government

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







10 Kubernetes Security Context Settings You Should Understand

by SnykMay 31, 2022

With an increased use of kubernetes among organizations, it's important to understand what security context settings can help make running workloads easier.

Download for full cheat sheet to learn more about: How to select the right security context setting How to use theses settings effectively and securely How security context settings can make running workloads easier


10-step Executive Action Plan for Collective Defense

by IronNet CybersecurityAug 04, 2020

A Collective Defense strategy — where companies, sectors, states, and nations collaborate on cyber defense as a united force — is providing a growing advantage against cyber attacks. This approach is quickly taking root. But how do you put Collective Defense into action?

In this eBook, you will learn: Key elements of Collective Defense Steps for preparing your organization Steps for leveraging advanced detection technologies Steps for collaborating for stronger defense


20 Tips to Make the Most of Your Pen Test

by Bishop FoxJun 03, 2022

Learn the common penetration test pitfalls that can cost you in terms of quality, project delays, or unnecessary expense — and twenty tips to help you avoid them.

Whether you're a pen test veteran, or are about to contract your first one, this resource guides you through process, from pre-assessment to the final report.

These tips include how to: Scope the right assessment for your needs Set up your project for success from the start Improve communication and


2018 Online Malware and Threats: A Profile of Today's Security Posture

by Dark ReadingOct 23, 2018

In 2016, enterprises encountered a range of new exploits and threats -- including ransomware and state-sponsored attacks -- and developed new plans of defense. How will these organizations be investing their cybersecurity budgets and staffing in the next 12 months? What tools and best practices do they consider most important, and which emerging technologies are they implementing?

This report, one of three to come out of Dark Reading's annual Strategic Security Survey, offers insight on


2019 Definitive Guide to Public Cloud Security

by LaceworkSep 18, 2019

To help organizations evaluate their cloud security options, Lacework analyzed how vendors compare across cloud server compliance, Kubernetes security, anomaly detection, container security, workload security, multicloud environments, and more.


2019 eSentire Threat Intelligence Spotlight: The Shifting Framework of Modern Malware

by eSentireSep 27, 2019

eSentire Threat Intelligence Spotlight: The Shifting Framework of Modern Malware draws on data gathered from the 650-plus organizations that eSentire protects and Carbon Black's extensive endpoint protection install base.

Key insights include: There is an approximate median of 10 variants within a malware family, which begins to highlight the challenges faced by traditional endpoint solutions The largest number of variants within a malware family is more than 200 It takes nearly


2019 Online Malware and Threats: A Profile of Today's Security Posture

by Dark ReadingSep 30, 2019

Dark Reading's 2019 Malware and Threat Report shows that cybercriminals have ramped up their attack volumes sharply-- especially those involving phishing attempts, ransomware, and business email compromise (BEC). The constant pummeling is putting new strain on risk assessment and threat response processes in many organizations.

This report based on our 2019 survey reveals a high level of concern over several new and emerging threats, including attacks on cloud service providers, BEC


2019 SANS Incident Response Survey Report

by DomainToolsOct 14, 2019

Information security rarely has a dull day. The past year delivered significant data breaches, impacting industries ranging from hospitality to legal to social media. We've seen a continuation of financially motivated threats, such as business compromise (BEC), which continue to pillage and drain corporate bank accounts. Ransomware has brought multiple cities to their knees, earning threat actors significant funds in the process. Coupled with the ever-looming threat that a nation-state-sponsored


2019 State of Privileged Access Management (PAM) Maturity Report

by ThycoticJan 21, 2020

With up to 80 percent of breaches due to compromised credentials, more organizations than ever before are prioritizing privileged account protection. Thycotic's "State of PAM Maturity" report highlights the disturbing results based on more than 450 responses worldwide to our online PAM Maturity Assessment.

See the three major key takeaways from the survey and recommendations for action in the complete 2019 State of Privileged Access Management (PAM) Maturity Report.
85% are still


2019 Threat Hunting Report

by DomainToolsOct 14, 2019

Based on a comprehensive survey of cybersecurity professionals in our 400,000-member Information Security Community on LinkedIn, the 2019 Threat Hunting Report confirms that organizations are increasing their operational maturity and investments in threat hunting. Organizations realize that proactively uncovering security threats pays off with earlier detection, faster response, and effective denial of future exploits that can damage business operations.

This survey also includes


SUBTOPICS:

Bishop Fox

Bishop Fox is the leading authority in offensive security, providing solutions ranging from continuous penetration testing, red teaming, and attack surface management to product, cloud, and application security assessments. We've worked with more than 25% of the Fortune 100, half of the Fortune 10, eight of the top 10 global technology companies, and all of the top global media companies to improve their security. Our Cosmos platform was named Best Emerging Technology in the 2021 SC Media Awards and our offerings are consistently ranked as "world class" in customer experience surveys. We're an active participant in the security community and have published more than 16 open source tools and 50 security advisories in the last five years. Learn more at bishopfox.com or follow us on Twitter.


Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


DomainTools

DomainTools, the recognized leader in domain name research and monitoring tools, offers the most comprehensive searchable database of domain name registration, Whois records and hosting data for online investigations and research. Cyber security analysts, fraud investigators, domain professionals and marketers use DomainTools to investigate cybercrime, protect their assets and monitor online activity. DomainTools has 12 years of history on domain name ownership, Whois records, hosting data, screenshots and other DNS records. That's why customers say, "Every online investigation starts with DomainTools." DomainTools customers include many Fortune 1000 companies, leading vendors in the Security and Threat Intelligence community and most crime-fighting government agencies. Individual users can start with an online Free Trial available at http://www.domaintools.com. Enterprise accounts are available from http://www.domaintools.com/about/contact-us.


eSentire

eSentire, Inc., the Authority in Managed Detection and Response, protecting the critical data and applications of 1000+ organizations in 70+ countries from known and unknown cyber threats. Founded in 2001, the company's mission is to hunt, investigate and stop cyber threats before they become business disrupting events. Combining cutting-edge machine learning XDR technology, 24/7 Threat Hunting, and proven security operations leadership, eSentire mitigates business risk, and enables security at scale. The Team eSentire difference means enterprises are protected by the best in the business with a named Cyber Risk Advisor, 24/7 access to SOC Cyber Analysts & Elite Threat Hunters, and industry-leading threat intelligence research from eSentire's Threat Response Unit (TRU). eSentire provides Managed Risk, Managed Detection and Response and Incident Response services. For more information, visit www.esentire.com and follow @eSentire.


IronNet Cybersecurity

Since IronNet was founded in 2014, our mission has been to deliver the power of collective cybersecurity to defend companies, sectors, and nations so that people, companies, and nations can live and work with peace of mind in cyberspace. Today, organizations around the world turn to IronNet to detect known and unknown cyber threats targets in their networks and share that information with peers so that all members can collectively defend against that threat.


Lacework

A complete security platform for your DevOps workloads, containers, & cloud environments.


Snyk

Snyk is the leader in developer security. We empower the world's developers to build secure applications and equip security teams to meet the demands of the digital world. Our developer-first approach ensures organizations can secure all of the critical components of their applications from code to cloud, leading to increased developer productivity, revenue growth, customer satisfaction, cost savings and an overall improved security posture. Snyk's Developer Security Platform automatically integrates with a developer's workflow and is purpose-built for security teams to collaborate with their development teams. Snyk is used by 1,200 customers worldwide today, including industry leaders such as Asurion, Google, Intuit, MongoDB, New Relic, Revolut and Salesforce.


Thycotic

Headquarters: Washington DC

Thycotic is the leading provider of cloud-ready privilege management solutions. Thycotic's security tools empower over 10,000 organizations, from small businesses to the Fortune 500, to limit privileged account risk, implement least privilege policies, control applications, and demonstrate compliance. Thycotic makes enterprise-level privilege management accessible for everyone by eliminating dependency on overly complex security tools and prioritizing productivity, flexibility and control. Headquartered in Washington, DC, Thycotic operates worldwide with offices in the UK and Australia.