TECH DIGITAL RESOURCE LIBRARY

Insurance

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







4 Reasons to Add UBA to Your SIEM

by SplunkMar 19, 2019

Download your complimentary copy of "4 Reasons to Add UBA to Your SIEM" and discover why adding a machine-learning UBA solution can prove to be an invaluable addition to your SIEM.


7 SIEM Trends to Watch in 2019

by SplunkMar 19, 2019

Since the inception of SIEM technology, SIEM solutions have become more of an information platform, with enterprise demands for better security driving the market. Read "7 SIEM Trends to Watch in 2019" to discover the exciting features on the horizon.


FutureWatch Report

by eSentireJan 31, 2019

Data-driven report with industry-specific guidance to inform a company's 2019 cybersecurity plan as technology evolves.


The State of Cyber Security Incident Response

by Dark ReadingFeb 26, 2019

Every day, enterprises wrestle with cybersecurity compromises of all sizes and types, ranging from simple viruses to complex, targeted online attacks. To successfully defend their data, IT organizations are developing teams, tools, and processes to quickly respond to new cyber threats and compromises - but not all of them are succeeding. In this survey, we find out how enterprises are building their incident response teams and processes, how they research


Security and Privacy vs. Innovation: The Great Balancing Act

by InformationWeekFeb 12, 2019

Emerging technologies like the Internet of Things, artificial intelligence, machine learning, and advanced mobile applications can help a company reap the benefits of better customer relations, operational efficiencies, and increased revenues. However, each of those technologies present security risks to corporate and customer data. They may clash with the demands of best security practices and government and industry regulations.

This InformationWeek IT Trend Report will help you


Cybersecurity for Digital Twins

by Cloakware by IrdetoFeb 12, 2019

Given the recent amount of interest in digital twins, you'd be forgiven for thinking it's a radical new concept. But the reality is that digital twins have been around for decades, known more commonly as emulators, simulators or clones. Twinning was traditionally used by companies to manage very large and complex assets; twins were developed in-house and often built using proprietary toolsets.


5 Emerging Cyber Threats to Watch for in 2019

by Dark ReadingFeb 04, 2019

Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.

IN THIS ISSUE: 5 Emerging Cyber Threats to Watch for in 2019Who Takes Responsibility for Cyberattacks in the Cloud? Spending Spree: What's on Security


The Power of a Tailored Threat Model

by LookingGlass Cyber Solutions, Inc.Feb 01, 2019

Companies often struggle to effectively operationalize threat intelligence. This white paper explores what analysts need to build a threat model, score risk, and perform gap analysis for a proactive security posture.


Making Application Security Pay

by VeracodeFeb 01, 2019

By measuring, proving, and amplifying the effects of AppSec, you can increase value and your return.


2018 Annual Threat Report

by eSentireJan 31, 2019

In-depth threat intelligence on last year's most prolific cyber attacks provides guidance on what to watch for in 2019.


SUBTOPICS:

Cloakware by Irdeto

A security breach or a serious hack can be devastating to a company's brand. The damage - financial and reputational - could be so great that a business may never fully recover. Irdeto's Cloakware cybersecurity technology, products and solutions have been securing digital assets for 20 years. Irdeto was the inventor of whitebox cryptography and its Cloakware solutions are differentiated by its rich history of innovation and built-in diversity and renewability features.

Irdeto is a leader in cybersecurity and currently secures over 5 billion devices and applications as well as providing a wide range of security services for various industries, including media & entertainment, automotive and IoT connected industries.


Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


eSentire

We've simplified security, delivering an award-winning advanced service tailored to mid-sized enterprise that protects high-risk assets from advanced cyber threats that technology alone can miss, 24x7. While founded in 2001, we launched our managed security service in 2008 and have experienced rapid operational and geographic growth ever since. The company is privately held.


InformationWeek

Headquarters: 2 Penn Plaza, 15th Floor, New York, NY, 10121 United States

InformationWeek is the leading multimedia Business Technology brand providing CIOs and IT decision makers with unique perspective and tools that work in lock step with their decision making process - from the setting of business strategies to the evaluation and recommendation of technology solutions. Through its cross-media platform, which includes online sites, magazine, events and research, InformationWeek provides editorial content developed by both journalists and CIO and IT peers delivered when and how they want it, 24/7. The InformationWeek audience of more than 2 million buyers includes CIOs, IT executives and business managers who span across industries, job titles, company sizes and global borders.


LookingGlass Cyber Solutions, Inc.

Headquarters: Arlington County, VA

LookingGlass Cyber Solutions delivers threat protection against cyber 
attacks to global enterprises and government agencies by operationalizing threat intelligence across scalable platforms and network-based threat response products. Our worldwide team of security analysts augment these integrated solutions by enriching our data feeds, reducing false positives, and delivering intelligence and response capabilities.


Splunk

Splunk was founded to pursue a disruptive new vision: make machine data accessible, usable and valuable to everyone. Machine data is one of the fastest growing and most pervasive segments of "big data" - generated by websites, applications, servers, networks, mobile devices and the like that organizations rely on every day. By monitoring and analyzing everything from customer clickstreams and transactions to network activity and call records -and more, Splunk turns machine data into valuable insights no matter what business you're in. It's what we call operational intelligence.


Veracode

Veracode's the only independent provider of cloud-based application intelligence and security verification services. The Veracode platform provides the fastest, most comprehensive solution to improve the security of internally developed, purchased or outsourced software applications and third-party components. By combining patented static, dynamic and manual testing, extensive eLearning capabilities, and advanced application analytics, Veracode enables scalable, policy-driven application risk management programs that help identify and eradicate numerous vulnerabilities by leveraging best-in-class technologies from vulnerability scanning to penetration testing and static code analysis. Veracode delivers unbiased proof of application security to stakeholders across the software supply chain while supporting independent audit and compliance requirements for all applications no matter how they are deployed, via the web, mobile or in the cloud. Veracode works with customers in more than 80 countries worldwide representing Global 2000 brands. For more information, visit www.veracode.com, follow on Twitter