Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Government

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







(At Least) One Thing You Don't Know About Cloud Backup

by InformationWeekJul 03, 2013

You Don't Know the Cutting Edge of Cloud BackupOnce upon a time (say, five years ago), IT departments that sent backups to low-cost cloud file services were ahead of the curve -- mainly because the norm was shipping hard drives and tapes to fireproof safes. Since then, the number and variety of cloud backup options and features have grown significantly. If you're still using cloud backup like a remote FTP site, you're doing it wrong.In this report, we'll debut results of our new InformationWeek


[SANS] The Need for Speed: Integrated Threat Response

by LookingGlass Cyber Solutions, Inc.Feb 06, 2019

This paper discusses the concepts of security automation and integration and provide recommendations on how to use automated technology to make your team faster and more efficient. It's time security teams have a tool to keep up with modern attacks.


[Slideshow] 7 Key Stats that Size Up the Cybercrime Deluge

by Dark ReadingApr 27, 2018

Now that we've got a couple of months from this year in the rearview mirror, security researchers have had enough time to crunch the numbers from 2017. That means a raft of new reports analyzing last year's cybersecurity data with updated telemetry on the threat landscape, economic impact, and defense problems facing the cybersecurity industry. Here are some of the most illuminating highlights.


[Strategic Security Report] Navigating the Threat Intelligence Maze

by Dark ReadingDec 15, 2017

Over the past few years, enterprises have gained access to vast new resources of information about cybersecurity threats. New services that collect information about external threats are being combined with existing technologies for analyzing security events. Enterprises are better able to assess potential threats by correlating data from multiple sources to measure risk and prioritize defenses. How are organizations harnessing these new information resources? In this survey, IT security


10 Best Practices That Could Reshape Your IT Security Department

by Dark ReadingOct 25, 2018

This is Dark Reading's November Tech Digest, explores ten best practices that could reshape IT security departments.

IN THIS REPORT: 10 Best Practices That Could Reshape Your IT Security Department Managing Data the Way We Manage Money The Cloud Security Conundrum: Assets vs. Infrastructure Think Like an Attacker: How a Red Team Operates


10 Cyber Threats Small Businesses Can't Ignore

by InformationWeekJan 20, 2013

The email came from "Ivan" in Russia: "After a few minutes I'll start a DDoS attack on your site, and it will cease to work," the message said. "If you don't want to lose any profit, you pay me only $3,500."Endless Wardrobe, the Australian online clothing retailer under attack, refused to pay. As threatened, the site was flooded with bogus information requests, overwhelmed, and down for a week. Endless Wardrobe worked with its hosting provider to blunt the attack, but the defenses erected by the


10 Emerging Threats Every Enterprise Should Know About

by Dark ReadingAug 13, 2018

This Dark Reading's August Tech Digest explores ten emerging security threats to enterprise data.

IN THIS REPORT: 10 Emerging Threats Every Enterprise Should Know About Trading Platforms Riddled with Severe Flaws Cracking Cortana: The Dangers of Flawed Voice Assistants Demystifying Mental Health in the Infosec Community New Hack Weaponizes the Web Cache


10 Government Technology Innovators

by InformationWeekJan 20, 2013

IT professionals in government, as in all industries, are under pressure. Sure, resources are tight, and legacy IT systems and processes are the norm, but there’s also a growing expectation among the public that government agencies be more transparent and efficient and that their services be Web-enabled. What are government IT organizations to do?Many are getting creative in how they apply technology to meet their mandates. At the local, state, and federal levels, government technologists


10 Steps to Ace a FISMA Audit

by InformationWeekJan 20, 2013

The Federal Information Security Management Act known as FISMA, is typically thought to apply only to government organizations. However, contractors and vendors that provide services to, manage systems on behalf of, or maintain close relationships with a government agency may be held to similar standards.That can be a problem because FISMA regulations are confusing at best and more commonly just plain overwhelming. Not surprisingly, a cottage industry has sprung up of expensive contractors who


19 Minutes: A Minute-by-Minute Account of Collective Defense in Action

by CofenseSep 23, 2018

Employees received an email appearing to come from their CEO that bypassed all their other technology. See how this company analyzed, responded to, and resolved the attack - in less?than 20 minutes.


SUBTOPICS:

Cofense

Cofense focuses on engaging the human &emdash; your last line of defense after a phish bypasses other technology &emdash; and enabling incident response teams to quickly analyze and respond to targeted phishing attacks.


Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


InformationWeek

InformationWeek is the leading multimedia Business Technology brand providing CIOs and IT decision makers with unique perspective and tools that work in lock step with their decision making process - from the setting of business strategies to the evaluation and recommendation of technology solutions. Through its cross-media platform, which includes online sites, magazine, events and research, InformationWeek provides editorial content developed by both journalists and CIO and IT peers delivered when and how they want it, 24/7. The InformationWeek audience of more than 2 million buyers includes CIOs, IT executives and business managers who span across industries, job titles, company sizes and global borders.


LookingGlass Cyber Solutions, Inc.

Headquarters: Arlington County, VA

LookingGlass Cyber Solutions delivers threat protection against cyber 
attacks to global enterprises and government agencies by operationalizing threat intelligence across scalable platforms and network-based threat response products. Our worldwide team of security analysts augment these integrated solutions by enriching our data feeds, reducing false positives, and delivering intelligence and response capabilities.