Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.



Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...


Digital Brand Protection for Financial Institutions

by BlueVoyantOct 28, 2022

From online banking websites to mobile apps, these crucial parts of financial institutions are also easy targets. How can you start taking a proactive approach to protect your customers' assets and your brand?

Download this eBook to learn: Common cyber attacks used by today's threat actors against financial services institutions How threat actors gain access to phishing and spoofing kits The advantage of establishing a proactive approach to phishing and spoofing campaigns

Dynamic DNS Infrastructure: The Phisher's Cheat Code

by BlueVoyantOct 28, 2022

Dynamic DNS Infrastructure providers offer free dynamic DNS services and host thousands of active subdomains at any given moment. It is highly active — with threat actors using it to target the largest U.S. financial institutions via phishing websites.

Download this report to learn: The methods threat actors use to orchestrate phishing attempts Evasion mechanisms phishers employ to go undetected How to use this information to understand emerging threats in real time

How Enterprises Are Attacking the Cybersecurity Problem Report

by Dark ReadingNov 01, 2022

Data breaches and heightened worries over software supply chain threats and cloud vulnerabilities were major drivers of enterprise cybersecurity initiatives over the past year. Security decision-makers prioritized projects to reduce their organizations' exposure to attacks via these vectors even as they maintained a steady focus on mitigating phishing, malware, and other end-user threats. Download the latest report from Dark Reading: How Enterprises Are Attacking the Cybersecurity Problem to

Endpoint Security Buyers Guide

by SophosOct 07, 2015

See how the different security vendors stack up. Get an overview of endpoint security features, and capabilities, including next-gen technologies. Compare the leading vendors including Sophos, Symantec, McAfee, Kaspersky, Microsoft, Bitdefender, Trend Micro, SentinelOne, and CrowdStrike. See a summary of analyst reports from Gartner, Forrester, SE Labs, MRG Effitas, and AV Comparables.

Extended Detection and Response (XDR) - Beginner's Guide

by SophosOct 05, 2021

XDR (Extended Detection and Response) is a very hot topic in the cybersecurity world. Going beyond the endpoint and server to incorporate firewall, email and other data sources into your IT operations and threat hunting tasks is more important than ever before.

But what exactly is XDR? How can it benefit your organization? And how is it different from Endpoint Detection and Response (EDR)?

Read this beginner's guide for an introduction to Extended Detection and Response. It

Sophos 2022 Threat Report

by SophosJan 13, 2022

As we move into 2022, ransomware shows no signs of slowing down — that's no surprise. What we have seen in the past 18 months, however, is a shift in tactics: targets have shifted to ever-larger organizations, and the business model that dictates how ransomware attacks occur has evolved. It's up to IT professionals to proactively deal with these trends to meet the challenges just on the horizon and beyond. In this report you'll find: The future of ransomware The impact of

Global third-party risk management survey 2022

by DeloitteSep 28, 2022

This annual Third Party Risk Management (TPRM) report for 2022 features survey results revealing how organizations are responding to increasing expectations related to 5 key areas.

Discover key findings in the following areas: Addressing ESG risks Managing third-party resilience Integrated/holistic third-party management External assistance and managed service solutions Key post-pandemic TPRM trends

See Jane Secure

by OptivOct 12, 2022

You may have more than one — the employee who is a constant security disrupter. What can you do? Follow the actions Jane took to secure her organization and create a culture of cybersecurity awareness — with Optiv's help.

Inside the Mind of Modern Adversaries

by Bishop FoxSep 15, 2022

SANS, in partnership with Bishop Fox, surveyed 280 ethical hackers to gain insight into the mind and methods of modern adversaries — including what works and what doesn't.

Download the preliminary findings including: Average time to break into an environment Top factors that leave companies vulnerable Greatest ROI for hackers

Ready or Not: A Ransomware Self-Assessment

by Bishop FoxSep 15, 2022

Our interactive, downloadable self-assessment focuses on four key areas: vulnerability discovery, asset management, detection and response improvement, and team cohesion.

A quick look at some of the questions we include: When was the last time you ran internal and external penetration tests? What assets do you anticipate are the most at risk of a ransomware attack? When was the last time you tested your ability to detect specific TTPs? What specific steps you'll take once


Bishop Fox

Bishop Fox is the leading authority in offensive security, providing solutions ranging from continuous penetration testing, red teaming, and attack surface management to product, cloud, and application security assessments. We've worked with more than 25% of the Fortune 100, half of the Fortune 10, eight of the top 10 global technology companies, and all of the top global media companies to improve their security. Our Cosmos platform was named Best Emerging Technology in the 2021 SC Media Awards and our offerings are consistently ranked as "world class" in customer experience surveys. We're an active participant in the security community and have published more than 16 open source tools and 50 security advisories in the last five years. Learn more at or follow us on Twitter.


BlueVoyant combines internal and external cyber defense capabilities into an outcomes-based platform called BlueVoyant Elements®. Elements is cloud-native and continuously monitors your network, endpoints, attack surface, and supply chain plus the clear, deep, and dark web for vulnerabilities, risks, and threats; and takes action to protect your business, leveraging both machine learning-driven automation and human-led expertise. Elements can be deployed as independent solutions or together as a full-spectrum cyber defense platform. BlueVoyant's approach to cyber defense revolves around three key pillars — technology, telemetry, and talent — that deliver industry leading cybersecurity defense capabilities to more than 700 customers across the globe.

Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


Deloitte Cyber & Strategic Risk offers a unified approach to help you confidently tackle obstacles, build new capabilities, and move forward fast. Leverage our portfolio's breadth and depth to transform your organization knowing Deloitte has your back wherever you are on your journey.


Headquarters: Denver, CO

Optiv is the cyber advisory and solutions leader, delivering strategic and technical expertise to more than 7,000 companies across every major industry. We partner with organizations to advise, deploy and operate complete cybersecurity programs from strategy and managed security services to risk, integration and technology solutions. With clients at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can. At Optiv, we manage cyber risk so you can secure your full potential. 


Sophos evolves to meet every new challenge, protecting more than 400,000 organizations of all sizes in more than 150 countries from today's most advanced cyber threats. Powered by SophosLabs, our cloud-native and AI-enhanced solutions are able to adapt and evolve to secure endpoints and networks against never-before-seen cybercriminal tactics and techniques. Managed through our award-winning, cloud-based platform, Sophos Central, our best-of-breed products work together through our unique Synchronized Security system to share threat intelligence and respond to evolving threats. The Sophos suite of products secures networks and endpoints against automated and active-adversary breaches, ransomware, malware, exploits, data exfiltration, phishing, and more.