Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Insurance

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







Dark Reading - Check out Our Newsletters

by Dark ReadingJun 24, 2019

Subscribe to the Dark Reading newsletters and get your daily/weekly dose of news, analysis, and glimpse into the chaos and mystery of network and data security.


TrickBot/Gozi Malware Case Study: Online Processing

by BlueVoyantJun 24, 2019

Online Travel Agencies (OTA) have taken over the hospitality industry, and in their rush to move online many neglected focusing attention on crucial security measures. Download this case study to read about a West Coast-based OTA worked with BlueVoyant to respond, identify the malware, and remediate an attack resulting in almost $1 million in losses.


Emotet Malware Case Study

by BlueVoyantJun 24, 2019

Municipalities responsible for both large and small communities are often a target of cyber attackers because they are networked to key infrastructure and transmit sensitive financial data. Download this case study to learn how BlueVoyant identified and remediated an email-based phishing campaign giving the cyber attacker access to over 1,400 emails points.


Testing for Compliance Just Became Easier

by CymulateJun 18, 2019

Compliance has long been a fact of life for IT and security teams.


Telit Challenges Security Controls with Cymulate’s Breach & Attack Simulation

by CymulateJun 18, 2019

Telit Challenges Security Controls with Cymulate's Breach & Attack Simulation


4 Reasons to Add UBA to Your SIEM

by SplunkMar 19, 2019

Download your complimentary copy of "4 Reasons to Add UBA to Your SIEM" and discover why adding a machine-learning UBA solution can prove to be an invaluable addition to your SIEM.


7 SIEM Trends to Watch in 2019

by SplunkMar 19, 2019

Since the inception of SIEM technology, SIEM solutions have become more of an information platform, with enterprise demands for better security driving the market. Read "7 SIEM Trends to Watch in 2019" to discover the exciting features on the horizon.


Darktrace Antigena: The Future of AI-Powered Autonomous Response

by DarktraceJun 18, 2019

This white paper will explore the critical challenges that security teams face in this new era of cyber-threat, and how Darktrace Antigena is leveraging AI to autonomously fight back against advanced attacks, giving human responders the critical time needed to catch up.


Autonomous Response: Threat Report 2019

by DarktraceJun 18, 2019

This report details seven case studies of attacks that were intercepted and neutralized by cyber defense AI, including insider threat, ransomware, and IoT attacks.


2019 State of IT Infrastructure

by Network ComputingJun 06, 2019

Modern businesses depend on technology that moves fast, and IT organizations are moving away from legacy architectures to a new breed of software-defined, cloud-based, and open source infrastructure to meet the demands. This research will examine the current state of enterprise data center, storage and network infrastructure, explore how it is evolving, and look into future plans for implementation. The information submitted is collected by both Informa and our sponsor. Click


SUBTOPICS:

BlueVoyant

BlueVoyant is an analytics-driven cybersecurity company whose mission is to protect businesses of all sizes against agile and well-financed cyber attackers by providing unparalleled visibility, insight and responsiveness. BlueVoyant provides Advanced Threat Intelligence, Managed Security Services and Professional Services. The company is lead by a team of senior business executives and former government cyber leaders from Morgan Stanley, Thomson Reuters, NSA, FBI, GCHQ and Unit 8200. BlueVoyant has offices in the United States, Israel, the United Kingdom, Spain and the Philippines.


Cymulate

With a Research Lab that keeps abreast of the very latest threats, Cymulate proactively challenges security controls against the full attack kill chain, allowing hyper-connected organizations to avert damage and stay safe.
Cymulate is trusted by companies worldwide, from small businesses to large enterprises, including leading banks and financial services. They share our vision-to make it easy for anyone to protect their company with the highest levels of security. Because the easier cybersecurity is, the more secure your company-and every company-will be.


Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


Darktrace

Darktrace is the world's leading cyber AI company and the creator of Autonomous Response technology.

Its self-learning AI is modeled on the human immune system and used by over 3,000 organizations to protect against threats to the cloud, email, IoT, networks and industrial systems. This includes insider threat, industrial espionage, IoT compromises, zero-day malware, data loss, supply chain risk and long-term infrastructure vulnerabilities.

The company has over 900 employees, 40 offices and headquarters in San Francisco and Cambridge, UK. Every 3 seconds, Darktrace AI fights back against a cyber-threat, preventing it from causing damage.


Network Computing

Network Computing: Connecting The Infrastructure Community The rise of virtualization, cloud computing, and mobility is causing immense changes inside and outside the data center. Different specialties and hardware systems are now converging onto one enterprise infrastructure system. At the same time, IT leaders have more options than ever for how to build infrastructure, how to deliver applications and services, and how to allocate budgets. In order to choose and implement the most efficient strategies and technology investments, IT leaders must be constantly learning, understand how to ask the right questions, and be able to explain infrastructure complexities in a manner that makes sense to their business environments. What's our role? IT professionals count on Network Computing and its affiliated conference, Interop, to show them the how and why behind next-generation networks, data centers, storage systems, communications, and cloud architectures. Interop is the live event for the IT community, while Network Computing provides IT practitioners with an online multimedia experience. Network Computing provides community members with in-depth analysis on new and emerging infrastructure technologies, real-world advice on implementation and operations, and practical strategies for improving their skills and advancing their careers. Our community is a trusted resource for IT architects and engineers who must understand business requirements as well as build and manage the infrastructures to meet those needs. How do we accomplish this? The Network Computing community brings together experienced editors, expert consultants and speakers, and IT professionals - providing a forum for them to solve problems, exchange ideas, and build relationships. We strive to analyze IT from the IT professional's point of view. Many of our authors are Interop speakers and track chairs and the most trusted voices in networking, mobility, data centers, storage, cloud, and UC. Through our interactive platform, community members are able to learn from these industry leaders and contribute their own ideas to ongoing discussions all year long.


Splunk

Splunk was founded to pursue a disruptive new vision: make machine data accessible, usable and valuable to everyone. Machine data is one of the fastest growing and most pervasive segments of "big data" - generated by websites, applications, servers, networks, mobile devices and the like that organizations rely on every day. By monitoring and analyzing everything from customer clickstreams and transactions to network activity and call records -and more, Splunk turns machine data into valuable insights no matter what business you're in. It's what we call operational intelligence.