Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Strategic CIO

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







THE EDGE: Threat Monitor

by AkamaiOct 21, 2019

Akamai's Client Reputation Analysis tracks the behavior of individual IP addresses and assigns them a risk score in order to identify malicious clients. Our scoring system operates on a scale from 0-10, with 10 representing the most dangerous IPs.

This score can be used to inform better security decisions and allow security professionals to proactively block threats. Check it out now.


Media Under Assault

by AkamaiOct 18, 2019

From January 2018 through June 2019, Akamai recorded more than 61 billion credential stuffing attempts and more than 4 billion web application attacks. In this special edition of the State of the Internet / Security Report, we're focusing on data within the high tech, video media, and entertainment sectors — collectively named Media & Technology.

These three industries accounted for nearly 35% of all credential stuffing attacks, and almost 17% of the web application attacks seen


Developing a Threat Hunting Program: Checklist: A 5-Step Guide

by DomainToolsOct 14, 2019

This 5-step guide will help you understand how to conduct internal and external threat hunting activities in a programmatic manner as well as help organizations new to threat hunting create the foundations for conducting threat hunts.


Getting Started With Emerging Technologies

by InformationWeekOct 02, 2019

Looking to help your enterprise IT team ease the stress of putting new/emerging technologies such as AI, machine learning and IoT to work for their organizations? There are a few ways to get off on the right foot. In this report we share some expert advice on how to approach some of these seemingly daunting tech challenges.
Here's what's inside: How to Get Hands-On with Machine Learning: If you really want to understand the capabilities and limitations of machine learning, you have to


The DevOps Roadmap for Security

by Signal SciencesOct 02, 2019

DevOps is concerned with uniting two particular tribes: development and operations. These tribes have seemingly competing priorities: developers value features while operations value stability.

These contradictions are largely mitigated by DevOps. A strong argument could be made that the values of the security tribe--defensibility--could just as easily be brought into the fold, forming a triumvirate under the DevSecOps umbrella.

The security tribe's way forward is to find ways to


Detecting Account Takeovers and Defending your Users

by Signal SciencesOct 02, 2019

Organizations are under attack, but today's attacks aren't focused on attacking just servers - today's attacks focus on attacking your users. Account takeovers are on the rise, putting critical company data at risk. Learn about these attacks and how you can defend against them.

Download this whitepaper to learn:

• What are account takeovers?
• Why is account based security important?
• How do I detect account takeovers?
• How do most companies implement


Identifying Web Attack Indicators

by Signal SciencesOct 02, 2019

Attackers are always looking for ways into web and mobile applications. The 2019 Verizon Data Breach Investigation Report listed web applications the number ONE vector attackers use when breaching organization.

In this paper, we examine malicious web requests for four of the most common web attack methods and show how to gain the context and visibility that is key to stopping these attacks.

Key Learnings:
• Four common web layer attack types: account takeover, API abuse,


Technical Whitepaper: Cyber Exposure Score

by Tenable, Inc.Oct 02, 2019

See how the Cyber Exposure Score, derived through data science, can help improve your security posture.


2019 Online Malware and Threats: A Profile of Today's Security Posture

by Dark ReadingSep 30, 2019

Dark Reading's 2019 Malware and Threat Report shows that cybercriminals have ramped up their attack volumes sharply-- especially those involving phishing attempts, ransomware, and business email compromise (BEC). The constant pummeling is putting new strain on risk assessment and threat response processes in many organizations.

The newly released report based on our 2019 survey revealed a high level of concern over several new and emerging threats, including attacks on cloud service


2019 eSentire Threat Intelligence Spotlight: The Shifting Framework of Modern Malware

by eSentireSep 27, 2019

eSentire Threat Intelligence Spotlight: The Shifting Framework of Modern Malware draws on data gathered from the 650-plus organizations that eSentire protects and Carbon Black's extensive endpoint protection install base.

Key insights include: There is an approximate median of 10 variants within a malware family, which begins to highlight the challenges faced by traditional endpoint solutions The largest number of variants within a malware family is more than 200 It takes nearly


SUBTOPICS:

Akamai

Akamai is the leading cloud platform for helping enterprises provide secure, high-performing user experiences on any device, anywhere. At the core of the Company's solutions is the Akamai Intelligent Platform providing extensive reach, coupled with unmatched reliability, security, visibility and expertise. Akamai removes the complexities of connecting the increasingly mobile world, supporting 24/7 consumer demand, and enabling enterprises to securely leverage the cloud.

To learn more about how Akamai is accelerating the pace of innovation in a hyperconnected world, please visit www.akamai.com or blogs.akamai.com, and follow @Akamai on Twitter.


Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


DomainTools

DomainTools, the recognized leader in domain name research and monitoring tools, offers the most comprehensive searchable database of domain name registration, Whois records and hosting data for online investigations and research. Cyber security analysts, fraud investigators, domain professionals and marketers use DomainTools to investigate cybercrime, protect their assets and monitor online activity. DomainTools has 12 years of history on domain name ownership, Whois records, hosting data, screenshots and other DNS records. That's why customers say, "Every online investigation starts with DomainTools." DomainTools customers include many Fortune 1000 companies, leading vendors in the Security and Threat Intelligence community and most crime-fighting government agencies. Individual users can start with an online Free Trial available at http://www.domaintools.com. Enterprise accounts are available from http://www.domaintools.com/about/contact-us.


eSentire

eSentire is the largest pure-play Managed Detection and Response (MDR) service provider, keeping organizations safe from constantly evolving cyber-attacks that technology alone cannot prevent. Its 24x7 Security Operations Center (SOC), staffed by elite security analysts, hunts, investigates, and responds in real-time to known and unknown threats before they become business-disrupting events. Protecting more than $6 trillion in corporate assets, eSentire absorbs the complexity of cybersecurity, delivering enterprise-grade protection and the ability to comply with growing regulatory requirements.


InformationWeek

Headquarters: 2 Penn Plaza, 15th Floor, New York, NY, 10121 United States

InformationWeek is the leading multimedia Business Technology brand providing CIOs and IT decision makers with unique perspective and tools that work in lock step with their decision making process - from the setting of business strategies to the evaluation and recommendation of technology solutions. Through its cross-media platform, which includes online sites, magazine, events and research, InformationWeek provides editorial content developed by both journalists and CIO and IT peers delivered when and how they want it, 24/7. The InformationWeek audience of more than 2 million buyers includes CIOs, IT executives and business managers who span across industries, job titles, company sizes and global borders.


Signal Sciences

Signal Sciences is the leading next-gen WAF and RASP web application protection solution built to detect and stop attacks wherever you run your apps, APIs and microservices.