Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Security

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







Predictive Prioritization: How to Focus on the Vulnerabilities That Matter Most

by TenableFeb 24, 2019

Learn how you can differentiate between real and theoretical risks. Focus on the 3% of vulnerabilities likely to be exploited.


3 Things You Need to Know About Prioritizing Vulnerabilities

by TenableFeb 24, 2019

Discover the 3 critical steps to building an effective vulnerability remediation plan.


What’s the Answer to the Vulnerability Overload Problem? Key Findings from ESG’s Cyber Risk Management Survey

by TenableFeb 24, 2019

ESG's survey delves into the current state of cyber risk management. Do you know which threats pose the most risk?


Predictive Prioritization: Data Science Lets You Focus on the 3% of Vulnerabilities Likely to Be Exploited

by TenableFeb 24, 2019

16,500 new CVEs were disclosed in 2018. Learn how you can focus on the 3% of vulnerabilities likely to be exploited.


Embracing the Looming Challenge of 100% Encryption

by ExtraHopSep 04, 2018

Encryption is skyrocketing both inside corporate networks and on the public internet--and studies show that more and more attackers are utilizing numerous trends to hide their activities from your SOC. Luckily, there are methods you can use to embrace encryption in the enterprise without sacrificing your ability to see, hunt, and stop attackers.

Read the report for a deep dive into:

• Why decryption capabilities are crucial for the modern SOC
• The two primary methods


Building and Managing an IT Security Operations Program

by Dark ReadingMay 03, 2019

As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.

Here's what's inside:

• Building and Managing an IT Security Operations Program
• Here's What Happened When a SOC Embraced Automation
• Solving Security: Repetition or Redundancy?


Gartner Magic Quadrant for Network Performance Monitoring and Diagnostics

by ExtraHopMay 13, 2019

ExtraHop is the first vendor to move to into the Leader quadrant of Gartner's Magic Quadrant for Network Performance Monitoring and Diagnostics since its inception. We believe this reflects our innovation in the NPMD space as well as our commitment to uniting IT and Security professionals with complete visibility, real-time detection, and guided investigations that deliver performance and security from the inside out. Click download to receive your complimentary copy of the report!


The State of IT Operations and Cybersecurity Operations

by Dark ReadingMay 13, 2019

Conventional wisdom about today's data centers holds that IT and network operations centers (NOCs) and security operations centers (SOCs) are separate organizations staffed by separate teams using different technologies. But in practice, IT operations and security operations are often tightly intertwined, involving overlapping functions and a wide range of common challenges.

How are today's IT operations teams working with security teams? Which functions are assigned to which teams, and


The 5 Uncomfortable Truths About Phishing Defense

by CofenseMay 10, 2019

The Truth Will Set You Free--and Strengthen Your Phishing Defense

Get out of your comfort zone and embrace the truth about phishing defense and today's rapidly changing threat landscape. When over 90% of breaches start as phishing emails--threats that email gateways miss and other defenses are slow to stop--you need to stare the truth in the eye and rethink your approach.


The Cost of Third-Party Cybersecurity Risk Management

by CyberGRXMay 07, 2019

A recent CyberGRX study finds a large disparity between the importance of third-party cyber risk management (TPCRM) versus how ineffective current practices are throughout all major industries. Findings show that organizations must move to a far more scalable and quantitative method of evaluation to reduce third-party cyber exposure and bring confidence to TPCRM.


SUBTOPICS:

Cofense

Cofense focuses on engaging the human &emdash; your last line of defense after a phish bypasses other technology &emdash; and enabling incident response teams to quickly analyze and respond to targeted phishing attacks.


CyberGRX

CyberGRX provides enterprises and their third parties with the most cost-effective and scalable approach to third-party cyber risk management today. Built on the market's first third-party cyber risk Exchange, CyberGRX arms organizations with a dynamic stream of third-party data and advanced analytics helping organizations efficiently manage risk in their partner ecosystems. Based in Denver, CO, CyberGRX was designed with partners including Aetna, Blackstone and MassMutual.


Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


ExtraHop

ExtraHop is the leader in real-time IT analytics. Our platform makes data-driven IT a reality, applying advanced analytics and cloud-based machine learning to all digital interactions to deliver timely and accurate insight. IT leaders turn to ExtraHop first to help them make faster, better-informed decisions that improve performance, security, and digital experience. Just ask the hundreds of global ExtraHop customers, including Sony, Lockheed Martin, Microsoft, Adobe, and Google. To experience the power of ExtraHop, explore our interactive online demo: www.extrahop.com/demo


Tenable

Tenable Network Security provides continuous network monitoring to identify vulnerabilities, reduce risk and ensure compliance. Tenable Network Security's family of products includes SecurityCenter Continuous View and Nessus.