Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Software

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







Redefining Network Security eBook

by CiscoMay 26, 2021

Today's dynamic applications run everywhere. Now you can keep up. Cisco is redefining network security: We're integrating dynamic policies that protect at the network and workload levels, so you can work more securely.

Read "Redefining Network Security eBook" to learn about:
• How Cisco Secure Workload provides comprehensive visibility
• Why Cisco Secure Workload is the perfect choice when you're adopting a zero-trust model
• How you can enable your


Research from STL Partners and Vertiv Reveals Why Telcos Should Prioritize Efficiency and Sustainability in 5G Networks

by VertivMay 21, 2021

Embracing best practices, partnering with customers to amplify efficiency will be key for operators


Why Energy Management is Critical to 5G Success

by VertivMay 21, 2021

Even though 5G networks are up to 90% more efficient than their 4G predecessors, they still require far more energy due to increased network density, heavy reliance on IT systems, and increased network use and accelerated traffic growth.

Telecommunications operators must address these challenges in two ways:
• Adopting energy efficiency best practices across networks
• Encouraging their customers to adopt 5G-enabled services to reduce consumption and emissions


Take DevOps to the Next Level

by AccuricsApr 01, 2021

For years, IT teams have been speeding their software development efforts and reducing human error by merging the development, operations, and testing teams into a single cross-functional team that works together for the duration of the dev cycle. Now, however, there?s even more pressure on IT to speed up development while continuing to ensure quality outcomes and secure software. So how are companies meeting that demand? With a variety of next-level techniques, such as merging security


2021 State of ITOps and SecOps Report

by InformationWeekMay 03, 2021

Ensuring that organizations continue to operate securely and efficiently has been at the forefront of IT leaders' minds. 2020 brought a fundamental shift in the way we connect, operate, do business, and lead our everyday lives. A vital part of this digital transformation centers on IT Operations and Security Operations. With distributed workforces and a new perspective on the digital economy, leaders in the IT space needed to take a step back and ensure that they had the best possible practices


Legal Team’s Role in Investigating and Responding to a Data Breach

by AccessData, an Exterro CompanyApr 20, 2021

This white paper outlines the critical role of in-house legal in helping organizations effectively collaborate to manage post-breach investigations and minimize the damage—from the initial identification and investigation, through reporting findings and learning from the incident.

Download this paper to learn where Legal fits in the following categories: Planning for incident response Responding to a breach The post-breach response and investigation


Cybersecurity’s Next Wave: What Every Enterprise Should Know

by Dark ReadingJan 06, 2021

Cybersecurity technology and practices are undergoing a sea change. While COVID-19 quarantines literally turned enterprise networks upside down overnight, a new wave of online attacks put enterprise data at risk. Today?s security operations center, once focused entirely on perimeter defenses, is now abuzz with new disciplines, including threat hunting and incident response. And yesterday?s security technologies are being remade with new capabilities, including artificial intelligence,


A Quick Intro to Go Language Security Topics

by CheckmarxFeb 10, 2021

Are you new to the Go language (Golang), or are you an old-schooler who just wants a single resource highlighting all the security advantages of Go? You've come to the right place!

To help you quickly increase your knowledge of Go security in general, we've compiled this short summary of security topics you should be aware of when using Go. If you're ready to learn more... Let's Go!

This is a summary of the extended work found in The Go Language Guide — Web Application


The Application Security Testing Imperative

by CheckmarxFeb 10, 2021

This paper provides practical guidance for CISOs, CIOs, and DevOps leaders for designing an effective application security program to secure modern application development via an integrated approach. The paper also aims to equip application security practitioners with research data to support building the business case for AST investments.

In this White Paper, readers will learn: The Implications of Deadline-driven Decisions The Open Source Software Dilemma Demystifying DevSecOps


Nucleus Research: European Financial Services Institution ROI Case Study

by CheckmarxFeb 10, 2021

One of the largest European financial services institutions did not have a solution to address security vulnerabilities in their custom code. Falling under strict legal and industry standards for security and compliance, the organization considered manual approaches to address the security challenges they faced. However, they quickly realized they needed an integrated and automated way of improving the security of their custom code and looked to Checkmarx to remedy their situation.

As a


SUBTOPICS:

AccessData, an Exterro Company

Whether it's for investigation, litigation or compliance, AccessData, now an Exterro Company, offers industry-leading solutions that put the power of forensics in your hands. For more than 30 years, AccessData has worked with more than 130,000 clients in law enforcement, government agencies, corporations, service providers and law firms around the world to understand and focus on their unique collection-to-analysis needs. The result? Products that empower faster results, better insights, and more connectivity.

Faster insights, trusted answers and better results. Our proven approach to forensics gives you infinite benefits, no matter what the challenge.


Accurics

At Accurics™, we envision a world where organizations can innovate in the cloud with confidence. Our mission is to enable cyber resilience through self-healing as organizations embrace cloud native infrastructure. The Accurics platform self-heals cloud native infrastructure by codifying security throughout the development lifecycle. It programmatically detects and resolves risks across Infrastructure as Code before infrastructure is provisioned, and maintains the secure posture in runtime by programmatically mitigating risks from changes. Accurics enables organizations of all sizes to achieve cloud cyber resilience through free cloud-based and open source tools such as Terrascan™.


Checkmarx

Checkmarx is the global leader in software security solutions for modern enterprise software development. Checkmarx delivers the industry's most comprehensive Software Security Platform that unifies with DevOps and provides static and interactive application security testing, software composition analysis, and developer AppSec awareness and training programs to reduce and remediate risk from software vulnerabilities. Checkmarx is trusted by more than 40 of the Fortune 100 companies and half of the Fortune 50, including leading organizations such as SAP, Samsung, and Salesforce.com.


Cisco

Cisco (NASDAQ: CSCO) is the worldwide leader in IT that helps companies seize the opportunities of tomorrow by proving that amazing things can happen when you connect the previously unconnected. At Cisco customers come first and an integral part of our DNA is creating long-lasting customer partnerships and working with them to identify their needs and provide solutions that support their success.


Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


InformationWeek

InformationWeek is the leading multimedia Business Technology brand providing CIOs and IT decision makers with unique perspective and tools that work in lock step with their decision making process - from the setting of business strategies to the evaluation and recommendation of technology solutions. Through its cross-media platform, which includes online sites, magazine, events and research, InformationWeek provides editorial content developed by both journalists and CIO and IT peers delivered when and how they want it, 24/7. The InformationWeek audience of more than 2 million buyers includes CIOs, IT executives and business managers who span across industries, job titles, company sizes and global borders.


Vertiv

World's Leading Critical Digital Infrastructure Provider

Today's networks have become more distributed and more complex, making availability and connectivity symbiotic. You can't have one without the other. Vertiv connects and protects your network with core-to-edge.