Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Strategic CIO

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







Technical Whitepaper: Cyber Exposure Score

by Tenable, Inc.Oct 02, 2019

See how the Cyber Exposure Score, derived through data science, can help improve your security posture.


2019 Online Malware and Threats: A Profile of Today's Security Posture

by Dark ReadingSep 30, 2019

Dark Reading's 2019 Malware and Threat Report shows that cybercriminals have ramped up their attack volumes sharply-- especially those involving phishing attempts, ransomware, and business email compromise (BEC). The constant pummeling is putting new strain on risk assessment and threat response processes in many organizations.

This report based on our 2019 survey reveals a high level of concern over several new and emerging threats, including attacks on cloud service providers, BEC


2019 eSentire Threat Intelligence Spotlight: The Shifting Framework of Modern Malware

by eSentireSep 27, 2019

eSentire Threat Intelligence Spotlight: The Shifting Framework of Modern Malware draws on data gathered from the 650-plus organizations that eSentire protects and Carbon Black's extensive endpoint protection install base.

Key insights include: There is an approximate median of 10 variants within a malware family, which begins to highlight the challenges faced by traditional endpoint solutions The largest number of variants within a malware family is more than 200 It takes nearly


How to Combat Island Hopping

by Carbon BlackSep 27, 2019

More and more, cybercriminals are targeting smaller organizations as a means to attack larger ones. Attackers are exploiting vulnerabilities in the defenses of these less sophisticated companies and using their affiliation with the target as a point of entry. This is known as "Island Hopping."

To help you understand this threat, what it looks like in your environment, and the role Carbon Black can play in helping to combat it, take a look at this Island Hopping issue of our Threats on


Security and Intelligence with Ribbon Analytics

by Ribbon Communications Inc.Apr 03, 2019

Consolidate your Network Tools for Real-time Communications Security and Operations.


Understanding the Latest NIST Password Guidelines

by SpyCloudSep 05, 2019

Over the years, security professionals have learned surprising lessons about how password policies affect user behavior. Faced with complex requirements, people often take dangerous shortcuts.

To help organizations mitigate the risk posed by users' bad password habits, the National Institute of Standards and Technology (NIST) designed a set of password guidelines with human behavior in mind. Read this white paper from SpyCloud to understand what NIST's guidance means for your


Strategies for Minimizing Phishing Attack Risks

by ReversingLabsAug 09, 2019

The Phishing Attack Situation

There's no way around it. Sending emails with attachments, downloading web files and using shared folders are a part of how we conduct business and that's not going to change.

To hackers, these online communication modes are like highways into your network and they drive on them every day. It's why these paths are by far the largest source of malware attacks in general, and most important, malware that successfully evades defenses and makes its way


Darktrace Antigena: The Future of AI-Powered Autonomous Response

by DarktraceJun 18, 2019

This white paper will explore the critical challenges that security teams face in this new era of cyber-threat, and how Darktrace Antigena is leveraging AI to autonomously fight back against advanced attacks, giving human responders the critical time needed to catch up.


Autonomous Response: Threat Report 2019

by DarktraceJun 18, 2019

This report details seven case studies of attacks that were intercepted and neutralized by cyber defense AI, including insider threat, ransomware, and IoT attacks.


SANS Top New Attacks and Threat Report

by DomainToolsJul 23, 2019

Read this report to better understand the top new attacks and threats, gain deeper insight into cybersecurity trends on both the offensive and defensive sides, and get advice on steps enterprises must take to mitigate current and future risks.


SUBTOPICS:

Carbon Black

Carbon Black has designed the most complete next-gen endpoint-security platform, enabling organizations to stop the most attacks, see every threat, close security gaps, and evolve their defenses. The Cb Endpoint Security Platform helps organizations of all sizes replace legacy antivirus technology, lock down systems, and arm incident response teams with advanced tools to proactively hunt down threats. Today, Carbon Black has approximately 2,000 worldwide customers, including 25 of the Fortune 100 and more than 600 employees. Carbon Black was voted Best Endpoint Protection by security professionals in the SANS Institute's Best of 2015 Awards.


Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


Darktrace

Darktrace is the world's leading cyber AI company and the creator of Autonomous Response technology.

Its self-learning AI is modeled on the human immune system and used by over 3,000 organizations to protect against threats to the cloud, email, IoT, networks and industrial systems. This includes insider threat, industrial espionage, IoT compromises, zero-day malware, data loss, supply chain risk and long-term infrastructure vulnerabilities.

The company has over 900 employees, 40 offices and headquarters in San Francisco and Cambridge, UK. Every 3 seconds, Darktrace AI fights back against a cyber-threat, preventing it from causing damage.


DomainTools

DomainTools, the recognized leader in domain name research and monitoring tools, offers the most comprehensive searchable database of domain name registration, Whois records and hosting data for online investigations and research. Cyber security analysts, fraud investigators, domain professionals and marketers use DomainTools to investigate cybercrime, protect their assets and monitor online activity. DomainTools has 12 years of history on domain name ownership, Whois records, hosting data, screenshots and other DNS records. That's why customers say, "Every online investigation starts with DomainTools." DomainTools customers include many Fortune 1000 companies, leading vendors in the Security and Threat Intelligence community and most crime-fighting government agencies. Individual users can start with an online Free Trial available at http://www.domaintools.com. Enterprise accounts are available from http://www.domaintools.com/about/contact-us.


eSentire

eSentire is the largest pure-play Managed Detection and Response (MDR) service provider, keeping organizations safe from constantly evolving cyber-attacks that technology alone cannot prevent. Its 24x7 Security Operations Center (SOC), staffed by elite security analysts, hunts, investigates, and responds in real-time to known and unknown threats before they become business-disrupting events. Protecting more than $6 trillion in corporate assets, eSentire absorbs the complexity of cybersecurity, delivering enterprise-grade protection and the ability to comply with growing regulatory requirements.


ReversingLabs

We have a simple mission: To use our experience and expertise from the security world to provide state of the art solutions for organizations to protect all their digital assets.


Ribbon Communications Inc.

Ribbon Communications Inc. (Nasdaq: RBBN) delivers market-leading software solutions that secure and power many of the world's leading service provider and enterprise communications environments. Built on world-class technology and intellectual property, the company's cloud-native solutions deliver intelligent and secure real-time communications solutions for the cloud, network and enterprise edge. Ribbon's Kandy Cloud real-time communications software platform delivers advanced and embedded CPaaS and UCaaS capabilities enabling service providers to rapidly create and deploy high-value communications services. With locations in more than 25 countries and on six continents, Ribbon's innovative, market-leading portfolio empowers service providers and enterprises with carrier-grade real-time communications solution, along with a new level of security that runs in their network infrastructure, data centers and private cloud, or in the public cloud.


SpyCloud

SpyCloud is the leader in account takeover (ATO) prevention, protecting billions of consumer and employee accounts either directly or through product integrations. Our award-winning solutions proactively defeat fraud attempts and disrupt the criminals' ability to profit from stolen information.