Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Insurance

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







How to avoid a data breach

by 1PasswordNov 24, 2021

Cyberattacks don't discriminate. In fact, 80% of organizations say they're unprepared for a cyberattack.

Do you know how to close the security gaps that can lead to a data breach?

This guide will: Teach you basic steps on how to become a security-first organization How to take a holistic approach to online security The most effective way to keep your organization safe from a data breach


9 principles for a better company password policy

by 1PasswordNov 24, 2021

What's the ideal password policy?
Should you be emphasizing password length or complexity?

This guide will help you determine a policy that's strong enough to protect your business and thwart potential hackers, but not so complicated that employees will ignore it.

You'll learn: Why numbers and symbols should be optional The importance of passphrases How a password manager can help make your policy a success How to separate what's important from corporate


The guide to creating a culture of security

by 1PasswordNov 24, 2021

For today's business, security is a teamwide effort and should involve everyone at your organization, not just IT. All it takes is one slightly out-of-date computer or a reused password for a cyber criminal to gain access to your company's most sensitive data. Is your security risk management handled only by IT? Or, does proper security protocol permeate throughout your organization?

Download this guide to learn: How mindful habits can increase both productivity and security What your


A beginner’s guide to cybersecurity: 15 tips to protect your data and stay safe online

by 1PasswordNov 24, 2021

It doesn't take much to protect yourself from the vast majority of cybersecurity attacks. This guide breaks down the steps that anyone can follow to improve their digital defenses — both at home and in the office.

Download now to learn why it's important to: Keep your devices up to date Use 2FA everywhere it's offered Switch to a secure messaging app Understand what phishing is and how to avoid it


What Elite Threat Hunters See that Others Miss

by Team CymruNov 11, 2021

We spoke with a multinational corporation with several business units that employs threat reconnaissance to improve security. This walkthrough will illustrate the value of employing analysts in more strategic ways to optimize the incident response process, as well as improve prevention and detection.

Many cyber security veterans may not recognize threat reconnaissance as an option for them, as the activity conjures thoughts of intelligence agencies and military. For many,


Forrester Total Economic Impact Report Infographic

by Team CymruNov 11, 2021

Total Economic Impact™ of Pure Signal™ Recon Infographic

How to Achieve Tangible Financial Gains and a Proactive Security Posture

Team Cymru commissioned Forrester Consulting to quantify the positive financial impact of external threat hunting using Team Cymru's Pure Signal™ Recon solution. Supply chain risk is top of mind for most organizations. The company in this study applied external threat hunting to this challenge and is now able to tell third-party


The State of Threat Hunting and the Role of the Analyst

by Team CymruNov 11, 2021

Over 1,700 IT and IT security professionals across North America, Latin America, the UK and Europe responded to a Ponemon Institute study, commissioned by Team Cymru.

The results indicate that practitioners are working towards building more mature analyst teams and threat hunting capabilities, yet leadership lacks a firm understanding of the role these components should play in the overall security strategy.

The study tracks the level of importance placed on security


CISO's Survival Guide: Five tips to make your operations more efficient

by CBTSNov 24, 2021

Juggling security and business risks is a challenge when you're facing talent shortage, evolving threats, and a sprawling vendor landscape.

How can you go from overwhelmed to empowered? Download this survival guide to find out!


Case Study: Credit Union undergoes IT transformation

by CBTSNov 24, 2021

With face-to-face services becoming less desirable, this credit union was driven to find innovative security solutions to connect to and grow its customer base. By offloading day-to-day infrastructure, security, hardware, and software, the credit union has overcome IT challenges and is laser-focused on the future.

In business since 1935, this credit union overcame IT challenges and is now laser-focused on future growth, proving that organizations who invest in technology take the lead!


New Uses for Amazon S3 are Creating Security Risks for Your Business. This is Why.

by Perception PointNov 16, 2021

As the usage of AWS S3 increases so have the content types that are stored and shared on it. With this significant shift to the cloud, new security concerns have emerged for organizations that must protect their data. The days of siloed data centers are over. More connectivity means more risk, and the greater the risk, the more protection needed.

Modern enterprises and business application providers must be vigilant about their security and at the same time avoid being held back by


SUBTOPICS:

1Password

1Password is a privacy and security company, and the leader in enterprise password management. By combining industry-leading security and award-winning design, the company provides private, secure and user-friendly password and secrets management to businesses and consumers globally. 1Password's Enterprise Password Manager is trusted by more than 100,000 business customers, including IBM, Slack, Shopify, Under Armour, WealthSimple, PGA, Intercom and Gitlab.


CBTS

With deep capabilities across security, data, network, voice, managed services, monitoring and management, CBTS covers your technology needs with end-to-end expertise and is dedicated to driving business outcomes.


Perception Point

Perception Point is a Prevention-as-a-Service company, offering fast interception of any content-based attack across all cloud collaboration channels, including email, cloud storage, CRM apps, and messaging platforms. The company prevents phishing, BEC, spam, malware, Zero-days, and N-days well before they reach enterprise users. Deployed in minutes with no change to the enterprise's infrastructure, the Perception Point solution conforms with any policy and requires zero fuss from IT teams. The company's Incident Response team serves as a force multiplier to the enterprise's SOC team. To learn more about Perception Point, visit our website, or follow us on LinkedIn, Facebook, and Twitter.


Team Cymru

Since 2005, Team Cymru's mission has been to save and improve human lives by working with public and private sector analyst teams around the world, enabling them to track and take down bad actors of all kinds. The company delivers comprehensive visibility into global cyber threat activity and is a key source of intelligence for many cyber security and threat intelligence vendors. Its Community Services division provides no-cost threat detection, DDoS mitigation and threat intelligence to network operators, hosting providers and more than 140 CSIRT teams across 86+ countries. Enterprise security teams rely on its Pure Signal™ platform for on-demand visibility into what's happening virtually anywhere across the internet with a clarity similar to that of their own internal network telemetry. With this visibility, they close detection gaps, accelerate incident response and detect threats and vulnerabilities across entire enterprises and third-party ecosystems.