Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Security

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







3 Things You Need to Know About Prioritizing Vulnerabilities

by TenableFeb 24, 2019

91% of organizations had one cyberattack in the last 2 years. Learn how Predictive Prioritization can help you.


How to Think Like a Cyber Attacker

by Illusive NetworksMar 04, 2021

More and more, enterprises are discovering that the best way to test and defend their organization is to view their IT environment from the perspective of an attacker. But how do you predict an attacker's motives and simulate their methods, and how do you know that you aren?t overlooking key vulnerabilities? In this Dark Reading webinar, experts discuss methods for testing your security?s mettle by thinking like your adversary.


Informed CIO: Identity Management

by InformationWeekJan 20, 2013

Identity Management: 10 Questions to AskIn today’s global business operating environments, where organizational and geographical boundaries are crossed hundreds of times a day to get the job done, there’s a critical need for standardized identity management. CIOs should keep an eye on government and private-sector federation initiatives—including the GSA’s E-Authentication program, the Liberty Alliance Identity Assurance Framework (LIAF) and the Transglobal Secure


"A" Is For Audit-Proof

by InformationWeekJan 20, 2013

Could you benefit from an Active Directory security compliance assurance tool? Sure, but policy comes first.


[FreeBook] Network Security

by Taylor & FrancisAug 18, 2020

Network Security is relevant for those looking for understanding on several relevant topics such as authentication, mobile operating systems, and cyber resilience. The new edition also provides a brand new set of must-know fundamentals and tips.

This book features content from a range of CRC Press publications, including:

• Introduction to Computer and Network Security Navigating Shades of Gray, By Richard R. Brooks
• Managing A Network Vulnerability Assessment,


[Slideshow] 10 Mistakes End Users Make That Drive Security Managers Crazy

by Dark ReadingApr 27, 2018

We pinpointed 10 common ways employees mishandle - and inadvertently breach - an organization's security. Find out what they are here.


[Slideshow] 7 Key Stats that Size Up the Cybercrime Deluge

by Dark ReadingApr 27, 2018

Now that we've got a couple of months from this year in the rearview mirror, security researchers have had enough time to crunch the numbers from 2017. That means a raft of new reports analyzing last year's cybersecurity data with updated telemetry on the threat landscape, economic impact, and defense problems facing the cybersecurity industry. Here are some of the most illuminating highlights.


[Slideshow] 7 Steps to a Smooth, Secure Cloud Transition

by Dark ReadingApr 27, 2018

If you're thinking with a cloud-first mindset, you should be making sure all the right boxes are checked before you make the leap. Here, security experts highlight the most important steps to keep in mind while moving to the cloud. Find out what they had to say.


[Strategic Security Report] Assessing Cybersecurity Risk

by Dark ReadingJun 30, 2017

As cyber attackers become more sophisticated and enterprise defenses become more complex, many enterprises are faced with a complicated question: what is the risk of an IT security breach? This report, one of three to come out of Dark Reading's annual Strategic Security Survey, delivers insight on how today's enterprises evaluate the risks they face. In addition to providing survey data on the implementation of risk metrics and best practices, this report offers a look at security professionals'


[Strategic Security Report] Cloud Security's Changing Landscape

by Dark ReadingOct 31, 2017

The rapid migration to cloud services and applications has created a critical need for new strategies and technologies to keep data secure. In this survey, IT security professionals offer insight on their plans for securing data in the cloud. The survey will reveal how quickly cloud services and applications are expanding, the tools and services that organizations are employing to protect them, and enterprise plans for deploying next-generation cloud security technologies such as encryption,


SUBTOPICS:

Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


Illusive Networks

Headquarters: Tel Aviv, Israel

Illusive Networks empowers security teams to reduce business risk from today's advanced, targeted threats by destroying an attacker's ability to move laterally within networks. Illusive preempts attacks by shrinking the attack surface, detects unauthorized lateral movement early in the attack, and provides real-time forensics that enhance response. Agentless and automated, Illusive technology enables organizations to proactively intervene in the attack process to avoid operational disruption, while functioning with greater confidence in today's complex, hyper-connected world.


InformationWeek

InformationWeek is the leading multimedia Business Technology brand providing CIOs and IT decision makers with unique perspective and tools that work in lock step with their decision making process - from the setting of business strategies to the evaluation and recommendation of technology solutions. Through its cross-media platform, which includes online sites, magazine, events and research, InformationWeek provides editorial content developed by both journalists and CIO and IT peers delivered when and how they want it, 24/7. The InformationWeek audience of more than 2 million buyers includes CIOs, IT executives and business managers who span across industries, job titles, company sizes and global borders.


Taylor & Francis

As one of the world's largest publishers, Taylor & Francis (T&F) is advancing research and enabling knowledge to be discovered and shared. Publishing more than 1,500 journals and approximately 7,000 new books each year, T&F has a backlist in excess of 140,000 specialist titles.

Through our two main brands, Routledge and CRC Press, we are the world's leading academic publisher in the Humanities, Social Sciences, and STEM.

Discover our latest cybersecurity articles and books on emerging topics affecting the cybersecurity sector on our Cybersecurity Hub. We provide in-depth information on innovations and critical issues for new starters, technical specialists and senior management.

www.routledge.com

Interested in writing or editing a new book on a subject area in Cybersecurity? Please contact Gabriella Williams, Editor - [email protected]

Taylor & Francis Group, an Informa Company


Tenable

Tenable Network Security provides continuous network monitoring to identify vulnerabilities, reduce risk and ensure compliance. Tenable Network Security's family of products includes SecurityCenter Continuous View and Nessus.