Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Strategic CIO

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







Behavioral Cybersecurity Statistics

by HoxhuntJun 21, 2022

Understanding employee behavior in relation to cybersecurity as well as effective behavior change methodology is a critical step towards protecting individuals and organizations from phishing attacks and data breaches. This report analyzes email data of 1.6 million Hoxhunt participants and their 24.7 million simulations to uncover how email behavior varies across industries, job roles, and geographies.

Read "Behavioral Cybersecurity Statistics" to learn: How does your industry,


Make-or-Break Phishing Metrics

by HoxhuntJun 21, 2022

A one-pager on how to measure and drive behavior change that shields your organization from cyber-attack.

Read "Make-or-Break Phishing Metrics" to learn: What phishing simulation metrics to follow How to use the metrics to drive behavior change How to turn your employees into a human firewall that gives IT early warnings of real-world attacks


How To Create Behavior Change With Security Awareness Training?

by HoxhuntJun 21, 2022

Conducting yearly or quarterly security awareness training is not enough for reducing risk. Without frequent practice, people may not know what to do when they encounter an actual attack. It's not about negligence. It's about not providing people with the right training.

Behavior change is the best way to mitigate the risk related to employees. To strengthen organizational security, people must receive training that results in behavior change, meaning that they know what to do when


Why Mitigating Email Threats Should Be Your Top Priority?

by HoxhuntJun 21, 2022

Phishing is the most common technique intruders are using and solving it can have the highest impact on your organization's risk. Despite technological advances in email filtering, most cyberattacks still start with malicious emails. It's therefore essential to teach your employees to detect social engineering attacks as they will inevitably face them.

Read "Why Mitigating Email Threats Should Be Your Top Priority?" to learn: Why email threats require special attention Why


To Pay or Not to Pay? Solving for the Ransomware Risk Equation

by RubrikMay 19, 2022

You don?t want to pay a ransomware attacker. You can?t afford to pay a ransom, but can you afford NOT to pay it? CIOs ask themselves this question every day, and they rarely know the answer. Precious time is wasted while they try to determine the extent of the damage, the value of the data/assets impacted, the quality of backup systems, the opportunity costs of downtime, and more. In this webinar, you'll learn what topics IT executives need to study up on now, so they?re ready to tackle


Ransomware in Focus: New Research on CISO Perceptions, Perspectives, and Plans

by ZscalerMar 15, 2022

How are CISOs at leading organizations defending against the current onslaught of ransomware attacks? Three cybersecurity consultants interviewed over 250 CISOs, mostly in the United States, to gain their perspective on preventing, detecting, and responding to ransomware.

Topics covered include:
• How to decide whether to pay
• The financial impact of successful attacks
• Is ransomware insurance worth it?
• Attack stats by industry


The Wolf in Sheep's Clothing: How Low-Risk Exposures Lead to Destructive Attacks

by Bishop FoxJun 03, 2022

While high-profile exposures make headlines, the biggest risks are often vulnerabilities that are much less glamorous but much easier to exploit, offering useful footholds for attackers.

In this eBook, we explore: Commonly observed low-risk exposures and how they lead to destructive attacks Examples of exposures found in real-world environments How attack surface management and continuous pen testing can help you uncover, assess, prioritize, and remediate these types of


The Offensive Security Guide to Ransomware Readiness

by Bishop FoxJun 03, 2022

Ransomware attacks can derail business operations for companies big and small, and technology alone can't prevent these attacks. Threat preparation requires a "whole of company" approach.

Our ransomware readiness guide helps you develop a roadmap for your organization that gets security and extended teams aligned to: Understand your current state of ransomware readiness Prepare for ransomware attacks Identify gaps in your current strategy Measure progress to continually


Making the Business Case for Continuous Offensive Security

by Bishop FoxJun 03, 2022

Continuous offensive security solutions enable organizations to achieve better security outcomes at a fraction of the cost of other approaches. However, justifying investment in additional security solutions can be challenging without a strong business case.

Our guide contains: The factors, inputs, and calculations for making a business case for continuous offensive testing A return on investment (ROI) model customizable to your business Industry statistics to benchmark your


Automated Pen Testing vs Breach and Attack Simulation

by CymulateMay 18, 2022

What's the difference between Automated Penetration Testing and Breach and Attack Simulation? In this whitepaper, learn the questions you need to ask and get an at-a-glance comparison table. Learn which solution is best for your organization, download the whitepaper now.


SUBTOPICS:

Bishop Fox

Bishop Fox is the leading authority in offensive security, providing solutions ranging from continuous penetration testing, red teaming, and attack surface management to product, cloud, and application security assessments. We've worked with more than 25% of the Fortune 100, half of the Fortune 10, eight of the top 10 global technology companies, and all of the top global media companies to improve their security. Our Cosmos platform was named Best Emerging Technology in the 2021 SC Media Awards and our offerings are consistently ranked as "world class" in customer experience surveys. We're an active participant in the security community and have published more than 16 open source tools and 50 security advisories in the last five years. Learn more at bishopfox.com or follow us on Twitter.


Cymulate

For companies that want to manage their security posture against the evolving threat landscape: Cymulate SaaS-based Extended Security Posture Management (XSPM) deploys within an hour, enabling security professionals to continuously challenge, validate and optimize their cyber-security posture end-to-end across the MITRE ATT&CK® framework.

The platform provides out-of-the-box, expert, and threat intelligence-led risk assessments that are simple to deploy and use for all maturity levels, and constantly updated. It also provides an open framework to create and automate red and purple teaming by generating penetration scenarios and advanced attack campaigns tailored to their unique environments and security policies. Cymulate allows professionals to manage, know and control their dynamic environment.


Hoxhunt

Hoxhunt is a People-First Cybersecurity Platform that protects organizations and their employees from the risk of cyber attacks. Hoxhunt empowers employees with the skills and confidence to recognize and respond to attacks wherever they arise and provides security teams with real-time visibility into threats so they can react fast and limit their spread. The entire platform is autonomous, freeing up considerable time and allowing security teams to focus on what matters.

Hoxhunt works with leading global companies such as IGT, TomTom, Nets, Kärcher and we're partnering with the leading cybersecurity companies in the world, such as Microsoft and Deloitte.


Zscaler

Zscaler services enable any end user, from any place, using any device a rich Internet experience while enforcing security and business policy. We deliver this service using our Global Cloud Infrastructure. Rather than buying appliances, we have a new on-demand business model, whereby customers pay a subscription fee. Our cloud service is built upon ground-breaking, high-performance technology that eliminates latency. Zscaler reduces risk, lowers cost, improves resource utilization, and simplifies IT administration.