Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Insurance

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







API Security 101 Whitepaper

by Noname SecurityJan 25, 2022

APIs are everywhere in the modern IT world, and the volume of API traffic is only expected to grow. However, despite the power and popularity of APIs, many organizations struggle with API security. When it comes to securing APIs, traditional application security controls are not a complete solution.

In this API security white paper, we will cover: APIs as a widely adopted integration tool Two elements needed to deliver APIs API security challenges (even those different than


Cyber Attack Simulations vs Pen Testing vs Vulnerability Scanning

by CymulateMay 18, 2022

Between Pen-Testing, Vulnerability Scanning and cyber attack simulations, only one provides the proper education your team needs to prevent attackers from gaining an initial foothold. How else can cyber attack simulations minimize risk? Read the comparison here.


Identity Sprawl and the Toll of Enterprise Identity Debt

by Radiant LogicNov 02, 2021

This white paper is based on research conducted by Aite-Novarica Group between July and September 2021. Key takeaways include: Financial services companies have made significant investments in identity and access management solutions, but still maintain multiple disjointed and isolated identity data stores Fragmented identity repositories can increase risks during acquisitions The Radiant Logic Identity Fabric Data approach can radically simplify complex identity management


[Slideshow] 10 Mistakes End Users Make That Drive Security Managers Crazy

by Dark ReadingApr 27, 2018

We pinpointed 10 common ways employees mishandle - and inadvertently breach - an organization's security. Find out what they are here.


[Slideshow] 7 Key Stats that Size Up the Cybercrime Deluge

by Dark ReadingApr 27, 2018

Now that we've got a couple of months from this year in the rearview mirror, security researchers have had enough time to crunch the numbers from 2017. That means a raft of new reports analyzing last year's cybersecurity data with updated telemetry on the threat landscape, economic impact, and defense problems facing the cybersecurity industry. Here are some of the most illuminating highlights.


[Slideshow] 7 Steps to a Smooth, Secure Cloud Transition

by Dark ReadingApr 27, 2018

If you're thinking with a cloud-first mindset, you should be making sure all the right boxes are checked before you make the leap. Here, security experts highlight the most important steps to keep in mind while moving to the cloud. Find out what they had to say.


[Strategic Security Report] Assessing Cybersecurity Risk

by Dark ReadingJun 30, 2017

As cyber attackers become more sophisticated and enterprise defenses become more complex, many enterprises are faced with a complicated question: what is the risk of an IT security breach? This report, one of three to come out of Dark Reading's annual Strategic Security Survey, delivers insight on how today's enterprises evaluate the risks they face. In addition to providing survey data on the implementation of risk metrics and best practices, this report offers a look at security professionals'


[Strategic Security Report] Navigating the Threat Intelligence Maze

by Dark ReadingDec 15, 2017

Over the past few years, enterprises have gained access to vast new resources of information about cybersecurity threats. New services that collect information about external threats are being combined with existing technologies for analyzing security events. Enterprises are better able to assess potential threats by correlating data from multiple sources to measure risk and prioritize defenses. How are organizations harnessing these new information resources? In this survey, IT security


10 Critical Issues to Cover in Your Vendor Security Questionnaire

by PanoraysApr 17, 2020

Companies must carefully check their vendors' cyber posture, and the initial vetting of any third party usually begins with a comprehensive security questionnaire. What are the key questions that must be addressed to determine if vendors have a strong cyber posture?

Download this guide to learn the most important ones to consider, including: Does customer data leave the vendor's production systems? Does the vendor support single sign-on? Does the vendor have an employee security


10 Emerging Threats Every Enterprise Should Know About

by Dark ReadingAug 13, 2018

This Dark Reading's August Tech Digest explores ten emerging security threats to enterprise data.

IN THIS REPORT: 10 Emerging Threats Every Enterprise Should Know About Trading Platforms Riddled with Severe Flaws Cracking Cortana: The Dangers of Flawed Voice Assistants Demystifying Mental Health in the Infosec Community New Hack Weaponizes the Web Cache


SUBTOPICS:

Cymulate

For companies that want to manage their security posture against the evolving threat landscape: Cymulate SaaS-based Extended Security Posture Management (XSPM) deploys within an hour, enabling security professionals to continuously challenge, validate and optimize their cyber-security posture end-to-end across the MITRE ATT&CK® framework.

The platform provides out-of-the-box, expert, and threat intelligence-led risk assessments that are simple to deploy and use for all maturity levels, and constantly updated. It also provides an open framework to create and automate red and purple teaming by generating penetration scenarios and advanced attack campaigns tailored to their unique environments and security policies. Cymulate allows professionals to manage, know and control their dynamic environment.


Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


Noname Security

Noname Security is the only company taking a complete, proactive approach to API Security. Noname works with 20% of the Fortune 500 and covers the entire API security scope across three pillars — Posture Management, Runtime Security, and Secure API SDLC. Noname Security is privately held, remote first with headquarters in Palo Alto, California, and an office in Tel Aviv and Amsterdam.


Panorays

Panorays automates third-party security lifecycle management.

With the Panorays platform, companies dramatically speed up their third-party security evaluation process and gain continuous visibility while ensuring compliance to regulations such as GDPR, CCPA and NYDFS.

It is the only platform that enables companies to easily view, manage and engage on the security posture of their third parties, vendors, suppliers and business partners.


Radiant Logic

Radiant Logic, the enterprise Identity Data Fabric company, provides the cornerstone of complex identity architectures in today's digital world. With Radiant, it's fast and easy to put identity data to work, connecting many disparate data sources across legacy and cloud infrastructures in real-time, without disruption. Their solution creates a solid identity foundation that speeds the success of initiatives, including single sign-on, M&A integrations, identity governance and administration, cloud directory deployments, hybrid and multi-cloud environments, customer identity and access management, and more. From the Fortune 1000 to government agencies, organizations across the globe rely on Radiant to deliver meaningfully faster time-to-value and unprecedented IT agility, while building a secure, future-proof identity infrastructure that meets real-world business demands.