Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Strategic CIO

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







U.S. State Protection Laws 2019

by SpirionNov 14, 2019

A great deal of effort was spent this year educating the business and private sector about the 2020 California Consumer Privacy Act (CCPA). However, are you familiar with the 18 other consumer-centric data protection laws that went into effect in 2019? Find out about their nuances like breach notification and data protection requirements in this infographic on US data protection laws.


2019 State of the Internet / Security: Phishing - Baiting the Hook

by AkamaiOct 30, 2019

Phishing isn't a new phenomenon. Since the early days of the Internet, nefarious actors have been impersonating people and businesses in order to first gain your trust, and then your personal information. Now that the Internet is more prevalent in our lives, attackers are getting savvier, making their phishing attacks more sophisticated so that we still fall for them - no matter how aware we are.

Phishing attacks require two things: a lure and a landing. Download this installment of the


Assessing Cybersecurity Risk in Today's Enterprise

by Dark ReadingOct 29, 2019

Security leaders are struggling to understand their organizations' risk exposure. While many are confident in their security strategies and processes, they're also more concerned than ever about getting breached.

Dark Reading's annual 2019 Strategic Security survey reveals that many companies are uncertain about their data breach exposure because of growing threat sophistication, increasing attack volumes, and many other factors. A high percentage of IT leaders see employees as presenting


THE EDGE: Threat Monitor

by AkamaiOct 21, 2019

Akamai's Client Reputation Analysis tracks the behavior of individual IP addresses and assigns them a risk score in order to identify malicious clients. Our scoring system operates on a scale from 0-10, with 10 representing the most dangerous IPs.

This score can be used to inform better security decisions and allow security professionals to proactively block threats. Check it out now.


2019 State of the Internet / Security: Media Under Assault

by AkamaiOct 18, 2019

From January 2018 through June 2019, Akamai recorded more than 61 billion credential stuffing attempts and more than 4 billion web application attacks. In this special edition of the State of the Internet / Security Report, we're focusing on data within the high tech, video media, and entertainment sectors — collectively named Media & Technology.

These three industries accounted for nearly 35% of all credential stuffing attacks, and almost 17% of the web application attacks seen


Developing a Threat Hunting Program: Checklist: A 5-Step Guide

by DomainToolsOct 14, 2019

This 5-step guide will help you understand how to conduct internal and external threat hunting activities in a programmatic manner as well as help organizations new to threat hunting create the foundations for conducting threat hunts.


Getting Started With Emerging Technologies

by InformationWeekOct 02, 2019

Looking to help your enterprise IT team ease the stress of putting new/emerging technologies such as AI, machine learning and IoT to work for their organizations? There are a few ways to get off on the right foot. In this report we share some expert advice on how to approach some of these seemingly daunting tech challenges.
Here's what's inside: How to Get Hands-On with Machine Learning: If you really want to understand the capabilities and limitations of machine learning, you have to


The DevOps Roadmap for Security

by Signal SciencesOct 02, 2019

DevOps is concerned with uniting two particular tribes: development and operations. These tribes have seemingly competing priorities: developers value features while operations value stability.

These contradictions are largely mitigated by DevOps. A strong argument could be made that the values of the security tribe--defensibility--could just as easily be brought into the fold, forming a triumvirate under the DevSecOps umbrella.

The security tribe's way forward is to find ways to


Detecting Account Takeovers and Defending your Users

by Signal SciencesOct 02, 2019

Organizations are under attack, but today's attacks aren't focused on attacking just servers - today's attacks focus on attacking your users. Account takeovers are on the rise, putting critical company data at risk. Learn about these attacks and how you can defend against them.

Download this whitepaper to learn:

• What are account takeovers?
• Why is account based security important?
• How do I detect account takeovers?
• How do most companies implement


Identifying Web Attack Indicators

by Signal SciencesOct 02, 2019

Attackers are always looking for ways into web and mobile applications. The 2019 Verizon Data Breach Investigation Report listed web applications the number ONE vector attackers use when breaching organization.

In this paper, we examine malicious web requests for four of the most common web attack methods and show how to gain the context and visibility that is key to stopping these attacks.

Key Learnings:
• Four common web layer attack types: account takeover, API abuse,


SUBTOPICS:

Akamai

Akamai is the leading cloud platform for helping enterprises provide secure, high-performing user experiences on any device, anywhere. At the core of the Company's solutions is the Akamai Intelligent Platform providing extensive reach, coupled with unmatched reliability, security, visibility and expertise. Akamai removes the complexities of connecting the increasingly mobile world, supporting 24/7 consumer demand, and enabling enterprises to securely leverage the cloud.

To learn more about how Akamai is accelerating the pace of innovation in a hyperconnected world, please visit www.akamai.com or blogs.akamai.com, and follow @Akamai on Twitter.


Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


DomainTools

DomainTools, the recognized leader in domain name research and monitoring tools, offers the most comprehensive searchable database of domain name registration, Whois records and hosting data for online investigations and research. Cyber security analysts, fraud investigators, domain professionals and marketers use DomainTools to investigate cybercrime, protect their assets and monitor online activity. DomainTools has 12 years of history on domain name ownership, Whois records, hosting data, screenshots and other DNS records. That's why customers say, "Every online investigation starts with DomainTools." DomainTools customers include many Fortune 1000 companies, leading vendors in the Security and Threat Intelligence community and most crime-fighting government agencies. Individual users can start with an online Free Trial available at http://www.domaintools.com. Enterprise accounts are available from http://www.domaintools.com/about/contact-us.


InformationWeek

InformationWeek is the leading multimedia Business Technology brand providing CIOs and IT decision makers with unique perspective and tools that work in lock step with their decision making process - from the setting of business strategies to the evaluation and recommendation of technology solutions. Through its cross-media platform, which includes online sites, magazine, events and research, InformationWeek provides editorial content developed by both journalists and CIO and IT peers delivered when and how they want it, 24/7. The InformationWeek audience of more than 2 million buyers includes CIOs, IT executives and business managers who span across industries, job titles, company sizes and global borders.


Signal Sciences

Signal Sciences is the leading next-gen WAF and RASP web application protection solution built to detect and stop attacks wherever you run your apps, APIs and microservices.


Spirion

Spirion is a pioneer in the critical first step of data security and compliance -- intelligent data discovery and classification. This step positions organizations to achieve unparalleled protection of sensitive data in today's ever-changing regulatory landscape -- and proactively minimizes the risks, costs, and reputational damage of cyberattacks.