Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.



Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...


Breaches Prompt Changes to Enterprise IR Plans and Processes

by Dark ReadingApr 26, 2022

Many organizations revised their incident response (IR) processes over the last year in response to high-profile breaches resulting from vulnerabilities in mission-critical software. Concerns over the breaches prompted a greater focus on automated tools and processes for detecting and responding to security incidents more effectively. However, many still emphasize attack prevention and perimeter defense over detection and response. Download Dark Reading's report to learn more about where today's

Dark Reading: Close the Visibility Gap

by ExtraHopMay 10, 2022

Broad adoption of encryption technologies is causing major shifts in the security operations and cyber threat landscape. This has led to changes in attacker techniques, creating fertile ground for the evolution of a new breed of advanced attacks.

As attackers grow more sophisticated, and regulations require tighter security and privacy measures, there is no escaping the decision to encrypt. Organizations must find a way to balance the increasing expectations for data security and data

A Practical Guide for Shields Up - For Organizations

by ExtraHopMay 10, 2022

In response to the Russia-Ukraine conflict, the Cybersecurity and Infrastructure Security Agency (CISA) issued its first-ever Shields Up notice, warning that with its cyber capabilities and history of targeting Western governments and corporations, cyberattacks from Russia are likely, if not imminent.

Since its inception in 2018, the U.S. Cybersecurity & Infrastructure Security Agency (CISA) has worked to provide critical guidance and information to government and private sector

The Key to an Effective Cybersecurity Strategy: Hands-on Training

by RangeForceApr 26, 2022

The Key to an Effective Cybersecurity Strategy: Hands-on Training

Today's security landscape has no shortage of tools and technologies. But unless the people using those tools are continuously upskilling, your cybersecurity strategy is costing you time and money.

Read "The Key to an Effective Cybersecurity Strategy" to learn: How to equip your team to effectively use tools at their disposal The importance of layered security The risks of not providing adequate

Ransomware Insights 2022

by RangeForceApr 26, 2022

Ransomware Insights 2022: Understand & Defend Against Ransomware

Ransomware, one of the most pervasive forms of malware, is a major threat to organizations of every size and type. In Ransomware Insights 2022, you'll learn: Top security protocols for organizational cyber defense readiness against ransomware How ransomware strikes, including the top access vectors and vulnerabilities Insights from both sides of the "to-pay-or-not-to-pay" debate

How Barclays Upskills a Global Security Team with RangeForce

by RangeForceApr 26, 2022

How Barclays Upskills a Global Security Team with RangeForce

Security breaches present a serious risk to the financial services industry. To minimize the possibility of a successful cyber attack, the Barclays team needed a robust partner that could help improve the organization's cyber defense capabilities and operational readiness.

Read the case study to see how Barclay's: Improved security culture, coordination, and cooperation across global teams Increased the

IoT and OT: Evolving Cyberthreats and Strategies for Risk Mitigation

by Microsoft SecurityApr 26, 2022

The recent proliferation of attacks against IoT and OT systems is driving increased awareness of the extent that virtual attacks can cause harm in physical scenarios, making IoT and OT security a high-priority issue. Mitigating these vulnerabilities requires taking an integrated, holistic approach that spans the entire organization and applies the same Zero Trust principles implemented in IT security.

This e-book discusses the current threat landscape, compiled from research

IT and OT Convergence Is Happening, but Is Security Ready?

by Microsoft SecurityApr 26, 2022

The growth of connected devices has presented CISOs across all industries - from automotive to waste management - with dramatically more vulnerable networks and larger threat landscapes. With comprehensive security that eliminates blind spots, provides continuous detection, enables rapid response and hardens security, they can be fearless.

For deeper insights on securing networks with both IT and OT devices, check out our eBook: IT and OT convergence is happening, but is security

How to Plan for Tomorrow’s SOC, Today

by Palo Alto Networks I CortexApr 27, 2022

2020 was a year under siege, from COVID-19 and work-from-home realities to sophisticated supply chain attacks like SolarWinds. Through it all, global network infrastructures have never felt more vulnerable.

This playbook outlines: 4 immediate steps you can take to improve SOC efficiencies 3 security technologies that are key to future-proofing your SOC How these technologies complement and strengthen any SecOps team Get started on SOC transformation efforts today to harden

Cortex XDR: XDR for Dummies Guide

by Palo Alto Networks I CortexApr 27, 2022

As a newer security solution category, many security pros have heard about extended detection and response (XDR), but they're not quite sure what it is.

Is it endpoint detection and response, network detection and response, security analytics or next-generation antivirus?

For those who prefer a "lighter lift," XDR For Dummies® will answer all of these questions and more.

Download this e-book, dig right in, and get up to speed on everything XDR.



Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


ExtraHop is the leader in real-time IT analytics. Our platform makes data-driven IT a reality, applying advanced analytics and cloud-based machine learning to all digital interactions to deliver timely and accurate insight. IT leaders turn to ExtraHop first to help them make faster, better-informed decisions that improve performance, security, and digital experience. Just ask the hundreds of global ExtraHop customers, including Sony, Lockheed Martin, Microsoft, Adobe, and Google. To experience the power of ExtraHop, explore our interactive online demo:

Microsoft Security

Microsoft Security helps protect people and data against cyberthreats to give you peace of mind. A comprehensive approach to security that's end-to-end, best in breed and AI driven can help you be fearless.

Palo Alto Networks I Cortex

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world's greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices. Our vision is a world where each day is safer and more secure than the one before. For more information, visit


RangeForce ( empowers team cyber defense readiness at scale. Our cloud-based platform takes a real-world, continuous approach to cybersecurity skills development. Sharpen the skills needed to defend your organization with interactive modules, challenges, and team-based threat exercises.