Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Insurance

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







Research: Remote Application Delivery

by InformationWeekJan 20, 2013

Anywhere, Anytime: Enabling Fast Remote Application DeliveryWe just dodged a tsunami of demand for remote access to desktop applications—had the H1N1 flu pandemic proved deadly on a wide scale in the United States, governments and large enterprises were set to pull the trigger on massive telework contingency plans. So what, you say? The Federal Mobility 2.0 study released by the Telework Exchange reported that 1,250,980 federal employees were eligible to telework in July 2008, with that


(At Least) One Thing You Don't Know About Cloud Backup

by InformationWeekJul 03, 2013

You Don't Know the Cutting Edge of Cloud BackupOnce upon a time (say, five years ago), IT departments that sent backups to low-cost cloud file services were ahead of the curve -- mainly because the norm was shipping hard drives and tapes to fireproof safes. Since then, the number and variety of cloud backup options and features have grown significantly. If you're still using cloud backup like a remote FTP site, you're doing it wrong.In this report, we'll debut results of our new InformationWeek


[Slideshow] 10 Mistakes End Users Make That Drive Security Managers Crazy

by Dark ReadingApr 27, 2018

We pinpointed 10 common ways employees mishandle - and inadvertently breach - an organization's security. Find out what they are here.


[Slideshow] 7 Key Stats that Size Up the Cybercrime Deluge

by Dark ReadingApr 27, 2018

Now that we've got a couple of months from this year in the rearview mirror, security researchers have had enough time to crunch the numbers from 2017. That means a raft of new reports analyzing last year's cybersecurity data with updated telemetry on the threat landscape, economic impact, and defense problems facing the cybersecurity industry. Here are some of the most illuminating highlights.


[Slideshow] 7 Steps to a Smooth, Secure Cloud Transition

by Dark ReadingApr 27, 2018

If you're thinking with a cloud-first mindset, you should be making sure all the right boxes are checked before you make the leap. Here, security experts highlight the most important steps to keep in mind while moving to the cloud. Find out what they had to say.


[Strategic Security Report] Assessing Cybersecurity Risk

by Dark ReadingJun 30, 2017

As cyber attackers become more sophisticated and enterprise defenses become more complex, many enterprises are faced with a complicated question: what is the risk of an IT security breach? This report, one of three to come out of Dark Reading's annual Strategic Security Survey, delivers insight on how today's enterprises evaluate the risks they face. In addition to providing survey data on the implementation of risk metrics and best practices, this report offers a look at security professionals'


[Strategic Security Report] Navigating the Threat Intelligence Maze

by Dark ReadingDec 15, 2017

Over the past few years, enterprises have gained access to vast new resources of information about cybersecurity threats. New services that collect information about external threats are being combined with existing technologies for analyzing security events. Enterprises are better able to assess potential threats by correlating data from multiple sources to measure risk and prioritize defenses. How are organizations harnessing these new information resources? In this survey, IT security


10 Critical Issues to Cover in Your Vendor Security Questionnaire

by PanoraysApr 17, 2020

Companies must carefully check their vendors' cyber posture, and the initial vetting of any third party usually begins with a comprehensive security questionnaire. What are the key questions that must be addressed to determine if vendors have a strong cyber posture?

Download this guide to learn the most important ones to consider, including: Does customer data leave the vendor's production systems? Does the vendor support single sign-on? Does the vendor have an employee security


10 Emerging Threats Every Enterprise Should Know About

by Dark ReadingAug 13, 2018

This Dark Reading's August Tech Digest explores ten emerging security threats to enterprise data.

IN THIS REPORT: 10 Emerging Threats Every Enterprise Should Know About Trading Platforms Riddled with Severe Flaws Cracking Cortana: The Dangers of Flawed Voice Assistants Demystifying Mental Health in the Infosec Community New Hack Weaponizes the Web Cache


2006 Best of Interop Awards

by InformationWeekJan 20, 2013

Our panel of experts evaluated a bevy of products, then chose the bestfrom seven categories including infrastructure, network software and services,and security. Check out this year's honorees as well as the Best Start-UpProduct and the Grand Prize winne


SUBTOPICS:

Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


InformationWeek

InformationWeek is the leading multimedia Business Technology brand providing CIOs and IT decision makers with unique perspective and tools that work in lock step with their decision making process - from the setting of business strategies to the evaluation and recommendation of technology solutions. Through its cross-media platform, which includes online sites, magazine, events and research, InformationWeek provides editorial content developed by both journalists and CIO and IT peers delivered when and how they want it, 24/7. The InformationWeek audience of more than 2 million buyers includes CIOs, IT executives and business managers who span across industries, job titles, company sizes and global borders.


Panorays

Panorays automates third-party security lifecycle management.

With the Panorays platform, companies dramatically speed up their third-party security evaluation process and gain continuous visibility while ensuring compliance to regulations such as GDPR, CCPA and NYDFS.

It is the only platform that enables companies to easily view, manage and engage on the security posture of their third parties, vendors, suppliers and business partners.