Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Security

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







3 Things You Need to Know About Prioritizing Vulnerabilities

by TenableFeb 24, 2019

91% of organizations had one cyberattack in the last 2 years. Learn how Predictive Prioritization can help you.


Informed CIO: Identity Management

by InformationWeekJan 20, 2013

Identity Management: 10 Questions to AskIn today’s global business operating environments, where organizational and geographical boundaries are crossed hundreds of times a day to get the job done, there’s a critical need for standardized identity management. CIOs should keep an eye on government and private-sector federation initiatives—including the GSA’s E-Authentication program, the Liberty Alliance Identity Assurance Framework (LIAF) and the Transglobal Secure


"A" Is For Audit-Proof

by InformationWeekJan 20, 2013

Could you benefit from an Active Directory security compliance assurance tool? Sure, but policy comes first.


[FreeBook] Network Security

by Taylor & FrancisAug 18, 2020

Network Security is relevant for those looking for understanding on several relevant topics such as authentication, mobile operating systems, and cyber resilience. The new edition also provides a brand new set of must-know fundamentals and tips.

This book features content from a range of CRC Press publications, including:

• Introduction to Computer and Network Security Navigating Shades of Gray, By Richard R. Brooks
• Managing A Network Vulnerability Assessment,


[SANS] The Need for Speed: Integrated Threat Response

by LookingGlass Cyber Solutions, Inc.Feb 06, 2019

This paper discusses the concepts of security automation and integration and provide recommendations on how to use automated technology to make your team faster and more efficient. It's time security teams have a tool to keep up with modern attacks.


[Slideshow] 10 Mistakes End Users Make That Drive Security Managers Crazy

by Dark ReadingApr 27, 2018

We pinpointed 10 common ways employees mishandle - and inadvertently breach - an organization's security. Find out what they are here.


[Slideshow] 7 Key Stats that Size Up the Cybercrime Deluge

by Dark ReadingApr 27, 2018

Now that we've got a couple of months from this year in the rearview mirror, security researchers have had enough time to crunch the numbers from 2017. That means a raft of new reports analyzing last year's cybersecurity data with updated telemetry on the threat landscape, economic impact, and defense problems facing the cybersecurity industry. Here are some of the most illuminating highlights.


[Slideshow] 7 Steps to a Smooth, Secure Cloud Transition

by Dark ReadingApr 27, 2018

If you're thinking with a cloud-first mindset, you should be making sure all the right boxes are checked before you make the leap. Here, security experts highlight the most important steps to keep in mind while moving to the cloud. Find out what they had to say.


[Strategic Security Report] Assessing Cybersecurity Risk

by Dark ReadingJun 30, 2017

As cyber attackers become more sophisticated and enterprise defenses become more complex, many enterprises are faced with a complicated question: what is the risk of an IT security breach? This report, one of three to come out of Dark Reading's annual Strategic Security Survey, delivers insight on how today's enterprises evaluate the risks they face. In addition to providing survey data on the implementation of risk metrics and best practices, this report offers a look at security professionals'


[Strategic Security Report] Cloud Security's Changing Landscape

by Dark ReadingOct 31, 2017

The rapid migration to cloud services and applications has created a critical need for new strategies and technologies to keep data secure. In this survey, IT security professionals offer insight on their plans for securing data in the cloud. The survey will reveal how quickly cloud services and applications are expanding, the tools and services that organizations are employing to protect them, and enterprise plans for deploying next-generation cloud security technologies such as encryption,


SUBTOPICS:

Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


InformationWeek

InformationWeek is the leading multimedia Business Technology brand providing CIOs and IT decision makers with unique perspective and tools that work in lock step with their decision making process - from the setting of business strategies to the evaluation and recommendation of technology solutions. Through its cross-media platform, which includes online sites, magazine, events and research, InformationWeek provides editorial content developed by both journalists and CIO and IT peers delivered when and how they want it, 24/7. The InformationWeek audience of more than 2 million buyers includes CIOs, IT executives and business managers who span across industries, job titles, company sizes and global borders.


LookingGlass Cyber Solutions, Inc.

Headquarters: Arlington County, VA

LookingGlass Cyber Solutions delivers threat protection against cyber 
attacks to global enterprises and government agencies by operationalizing threat intelligence across scalable platforms and network-based threat response products. Our worldwide team of security analysts augment these integrated solutions by enriching our data feeds, reducing false positives, and delivering intelligence and response capabilities.


Taylor & Francis

As one of the world's largest publishers, Taylor & Francis (T&F) is advancing research and enabling knowledge to be discovered and shared. Publishing more than 1,500 journals and approximately 7,000 new books each year, T&F has a backlist in excess of 140,000 specialist titles.

Through our two main brands, Routledge and CRC Press, we are the world's leading academic publisher in the Humanities, Social Sciences, and STEM.

Discover our latest cybersecurity articles and books on emerging topics affecting the cybersecurity sector on our Cybersecurity Hub. We provide in-depth information on innovations and critical issues for new starters, technical specialists and senior management.

www.routledge.com

Interested in writing or editing a new book on a subject area in Cybersecurity? Please contact Gabriella Williams, Editor - [email protected]

Taylor & Francis Group, an Informa Company


Tenable

Tenable Network Security provides continuous network monitoring to identify vulnerabilities, reduce risk and ensure compliance. Tenable Network Security's family of products includes SecurityCenter Continuous View and Nessus.