Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Security

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







The CISO's Guide to Metrics that Matter in 2021

by ReliaQuestJun 11, 2021

The security metrics that teams traditionally use lack context and fail to provide insights needed to make strategic decisions, leaving CISOs struggling to show ROI, identify critical gaps, and gain the support across the organization to mature their security program. This can leave security teams with a false sense of confidence and a less-than-optimal budget, all the while risk increases. By applying the security metrics that matter, CISOs can mature their security programs and articulate


The Security Game Should be Strategic, but Seems One of Chance

by ReliaQuestJun 11, 2021

The results of the 2021 ReliaQuest Security Technology Sprawl survey are in! Findings reveal that enterprise security, which should be strategic, is many times a game of chance. Burgeoning tool sprawl coupled with lack of strategic metrics and executive and operations misalignments hinder progress. But there is a way out of this quandary — improve efficacies of security tools, leverage automation to overcome resource issues and focus on ROI-based metrics.

Download the report to


Best-in-Class Security Operations and What it Takes to Get There

by ReliaQuestJun 11, 2021

The FBI reports that losses due to phishing, spoofing, various types of Internet-enabled fraud, and other scams exceeded $4.1 billion in 2020 in the United States. That's despite the bold initiatives and massive investments in security technologies that many organizations have made over the years to protect their users and other critical assets. IT leaders and Security Operations Center (SOC) teams have deployed best-of-breed security solutions in a valiant effort to keep the enterprise secure


The Future of Automation in Cybersecurity: Getting the Most from Automation and People

by ReliaQuestJun 11, 2021

The future of cybersecurity automation is technology augmenting people, not replacing them. The keys to better cybersecurity defenses are strategic integration of technologies and automation across the security lifecycle giving humans better insights so they can make confident decisions and respond fast. Read our latest Expert Focused eBook to learn how to get the most from automation and empower analysts so they can get and stay ahead.


4 Key Elements of an ML-Powered NGFW: How Machine Learning is Disrupting Security

by Palo Alto Networks | OptivJun 14, 2021

Today's IT environments and threat landscape present unprecedented challenges. Traditional network security is no longer enough. You need a proactive, cloud-based and machine learning-driven approach to keep your networks safe.

Read our eBook to learn how you can take advantage of all an ML-Powered NGFW has to offer, including:
• Inline ML-powered prevention on the NGFW itself
• Zero-delay signatures leveraging massive cloud scale
• ML- powered


The State of Zero Trust Security Strategies

by Palo Alto Networks | OptivJun 14, 2021

ESG recently surveyed 421 IT and cybersecurity professionals personally responsible for driving Zero Trust security strategies and evaluating, purchasing, and managing security technology products and services in support of Zero Trust initiatives.

Download the eBook to learn:
• The latest trends in Zero Trust security strategies
• What a Zero Trust initiative should entail
• Where to begin, and
• How best to overcome the organizational


Palo Alto Networks Zero Trust Maturity Model

by Palo Alto Networks | OptivJun 14, 2021

As with any strategic initiative, it's important to benchmark where you are as you begin your Zero Trust journey and measure your maturity as time goes on and as improvements are made to your Zero Trust environment. Designed using the Capability Maturity Model, the Zero Trust Maturity Model mirrors the 5-step methodology for implementing Zero Trust and should be used to measure the maturity of a single Protect Surface.


Ransomware Resilience and Response Playbook

by SophosApr 26, 2021

When ransomware locks up your business?s critical data and essential gear, panic can set in fast?which just makes you more vulnerable. But questions abound: is this a ransomworm that?s going to spread to other endpoints? Are the attackers going to dox us too? Should we pay the ransom even though we know we?re not supposed to? How good are our backups? Have we adequately prepared to continue business operations? Be prepared with some answers.


The State of Malware Threats

by Dark ReadingJun 08, 2021

The SolarWinds attack, disruptions caused by COVID-19, zero-day exploits, and emerging threats: It's been quite a year, and security teams have their work cut out for them when trying to stay a step ahead of malware-wielding criminals. The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


The 2021 Security Outcomes Study

by CiscoJun 09, 2021

Security is ever-evolving to the point that success can sometimes feel elusive. How is it that even the largest companies with the biggest security budgets still struggle to achieve certain outcomes? With all the various options out there for achieving a successful cybersecurity program, which ones should practitioners focus on? How can a security team determine what will work best?


SUBTOPICS:

Cisco

Cisco (NASDAQ: CSCO) is the worldwide leader in IT that helps companies seize the opportunities of tomorrow by proving that amazing things can happen when you connect the previously unconnected. At Cisco customers come first and an integral part of our DNA is creating long-lasting customer partnerships and working with them to identify their needs and provide solutions that support their success.


Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


Palo Alto Networks | Optiv

Palo Alto Networks, the global cybersecurity leader, continually delivers innovation to enable secure digital transformation — even as the pace of change is accelerating. With Security Solutions Integrator partner, Optiv, we innovate together with our clients, offering a prevention-focused architecture and end-to-end integrated solutions. We have designed solutions specifically focused on solving our client's largest and most complex cybersecurity and digital challenges.


ReliaQuest

ReliaQuest GreyMatter reduces complexity by integrating your existing technologies to provide a unified threat detection, investigation and response platform to manage and minimize risk. GreyMatter delivers Open XDR outcomes by increasing efficacy and operational efficiency, acting as a force multiplier for stretched security teams to ensure investment in the right areas.


Sophos

More than 100 million users in 150 countries rely on Sophos as the best protection against complex threats and data loss. Sophos is committed to providing complete security solutions that are simple to deploy, manage, and use that deliver the industry's lowest total cost of ownership. Sophos offers award winning encryption, endpoint security, web, email, mobile and network security backed by SophosLabs - a global network of threat intelligence centers. Sophos is headquartered in Boston, US and Oxford, UK.