Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Security

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







2020 State of Malware Report

by MalwarebytesJun 19, 2020

Stay informed, stay secure--2020 State of Malware

The 2020 State of Malware Report features data sets collected from product telemetry, honey pots, intelligence, and other research conducted by Malwarebytes threat analysts and reporters to investigate the top threats delivered by cybercriminals to businesses in 2019.

Read the report and discover: Threats to Mac and Windows, Android and iOS The volume of threats to specific regions and industries Net new ransomware


Threat Hunting Made Easy

by MalwarebytesJun 19, 2020

Hunting for Threats is No Longer a Luxury

Enjoy a cup of coffee for this 5-minute read and you'll be on your way to saving hours every month on threat investigation and response. Hunting for threats is no longer a luxury, it's a necessity.

Learn how response-driven investigations can deliver recovery in minutes with a solution that automates and guides you through these essential steps: Isolate: contain the suspicious activity Investigate: determine if the threat is


The Value of Multi-Vector Protection on the Endpoint

by MalwarebytesJun 19, 2020

Multi-vector endpoint protection to the rescue

Securing your endpoints with multi-layered techniques should not place undue efficiency or resource burdens on your operations or end users. For the strongest and most efficient endpoint security approach, pursue multi-vector protection from a single vector.

Read further to learn: What is multi-vector endpoint protection The differences between a multi-vector and single vendor solution Malwarebytes' real-time protection


Commitment to Innovation Secures Longtime Customer

by MalwarebytesJun 19, 2020

Going beyond a modern endpoint security solution

Learn what happened when Langdale Industries confronted Ineffective protection even with leading AV solutions Long hours of remediation, impeding end-user's ability to work A ransomware attack that shut down operations. Now a longtime customer, they attribute their confidence to Malwarebytes' commitment to innovation and excellent service. And it doesn't hurt that Malwarebytes is easy and its multiple detection techniques ensure


Preparing For, Detecting, and Managing a Critical Data Breach

by Dark ReadingApr 06, 2020

There is one nightmare day that all IT and cybersecurity professionals dread: the discovery of a critical data breach. It?s potentially one of the most impactful ? yet least predictable -- days that your business will face. And, to a large extent, that impact will be determined by the decisions you make next. For the most experienced and effective cybersecurity teams, though, that ?really bad day? doesn?t come as a surprise. Such teams prepare for security incidents with tools for


Preparing For, Detecting, and Managing a Critical Data Breach

by Dark ReadingApr 06, 2020

There is one nightmare day that all IT and cybersecurity professionals dread: the discovery of a critical data breach. It?s potentially one of the most impactful ? yet least predictable -- days that your business will face. And, to a large extent, that impact will be determined by the decisions you make next. For the most experienced and effective cybersecurity teams, though, that ?really bad day? doesn?t come as a surprise. Such teams prepare for security incidents with tools for


2020 Predictions in Application Security, Data Privacy, and Artificial Intelligence

by WhiteHat SecurityJun 03, 2020

In 2019, 12,174 new vulnerabilities were found in commercial and open source software. The total number of breached records were 15.1 billion. This is a 284% spike compared to 2018.

The triumphs, challenges and changes we have experienced, have opened up many opportunities, and our eyes, as to what the future holds for technology, development, and security. Now, in 2020, we are here with a mix of excitement, trepidation, and hope. And this time of year, we like to ask some of the


Top 10 Vulnerabilities of 2019: A Technical Deep Dive on Software Exploits

by WhiteHat SecurityJun 03, 2020

Applications continue to be a top target for digital adversaries, as more businesses rely on them to drive their revenue and success. And the proof is in the headlines.

It's in the nature of application development that hard deadlines can mean coding errors and are not always addressed before deployment. As a result, it's important to patch vulnerabilities as soon as they are found and by using the right application security tool, software teams can not only build their applications


The AI and Human Element Security Sentiment Study

by WhiteHat SecurityJun 03, 2020

How Two Powerful Forces Can Tackle Our Biggest Application Security Challenges

The "AI and Human Element Security Sentiment Study" is based on a survey of 102 industry professionals at the RSA Conference 2020. The research revealed that while over half of organizations use artificial intelligence (AI) or machine learning in their security stack, nearly 60 percent are still more confident in cyberthreat findings verified by humans over AI.

The survey responses, along with


Today's Non-Employee Lifecycle Management Without SecZetta

by SecZettaJun 02, 2020

Today, managing the identity lifecycle for non-employees is an arduous and time-consuming process. From onboarding to auditing and verification to the removal of access on termination, the lack of centralized or complete information can leave your organization exposed to risk.

SecZetta provides purpose-built solutions that enable organizations to execute risk-based identity and lifecycle strategies for diverse non-employee populations. Manual processes are replaced with automated


SUBTOPICS:

Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


Malwarebytes

Headquarters: San Jose CA 95113

Malwarebytes provides anti-malware and anti-exploit software designed to protect businesses and consumers against zero-day threats that consistently escape detection by traditional antivirus solutions. Malwarebytes Anti-Malware earned an "Outstanding" rating by CNET editors, is a PCMag.com Editor's Choice, and was the only security software to earn a perfect malware remediation score from AV-TEST.org. That's why more than 50,000 SMBs and Enterprise businesses worldwide trust Malwarebytes to protect their data. Founded in 2008, Malwarebytes is headquartered in California, operates offices in Europe, and employs a global team of researchers and experts


SecZetta

SecZetta provides third-party identity risk solutions that enable organizations to execute risk-based identity access and lifecycle strategies for diverse non-employee populations. Our solutions are purpose-built to manage the dynamic relationships organizations have with non-employees in an easy-to-use application that helps facilitate commercial strategies, support regulatory compliance, and reduce third-party risk.


WhiteHat Security

WhiteHat Security has been in the business of securing web applications for 17 years. Combining advanced technology with the expertise of its global Threat Research Center (TRC) team, WhiteHat delivers application security solutions that reduce risk, reduce cost and accelerate the deployment of secure applications and web sites. The company's flagship product, WhiteHat Sentinel, is a software-as-a-service platform providing dynamic application security testing (DAST), static application security testing (SAST), and mobile application security assessments. The company is headquartered in San Jose, Calif., with regional offices across the U.S. and Europe.