Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Strategic CIO

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







3 Approaches to Breach and Attack Simulation

by CymulateMay 18, 2022

The rise of Breach and Attack Simulation gives companies the ability to test the cyber posture of their organization continuously and safely. Download this whitepaper to learn about 3 different approaches of BAS technologies and which approach the Cymulate platform uses.


2021 State of Cybersecurity Effectiveness Usage Report

by CymulateMay 18, 2022

This report analyzes the results of 2021 clients' usage data, comprised of over one million real-world offensive tests by Cymulate's Extended Security Posture Management platform.

Including: How capable enterprises fared in detecting, fending off, or remediating attacks scenarios Prescriptive, data-driven advice on how to improve and maximize defensive capabilities Threat-actor behaviors and difficult to remediate techniques, tactics, and procedures Key insights and


Cyber Attack Simulations vs Pen Testing vs Vulnerability Scanning

by CymulateMay 18, 2022

Between Pen-Testing, Vulnerability Scanning and cyber attack simulations, only one provides the proper education your team needs to prevent attackers from gaining an initial foothold. How else can cyber attack simulations minimize risk? Read the comparison here.


2022 Cyber Predictions

by CymulateMay 18, 2022

Cymulate's Research Lab has shared their predictions for 2022; what's likely to change at the legislative, executive, and technical levels.

Read their predictions here.


The State of Malware Threats

by Dark ReadingMay 23, 2022

Threat actors ramped up malware attacks over the past 12 months to try and take advantage of gaps in enterprise security caused by accelerated use of cloud services and remote work models. The attacks left many IT and cybersecurity leaders feeling insecure about their organization's security posture. Download this report from Dark Reading to find out how cybersecurity teams are they are dealing with malware-related challenges. The information submitted is collected by both Informa Tech and


What Every Enterprise Should Know About Security Product Testing

by Dark ReadingMay 16, 2022

Selecting the right network security product for your organization can be a daunting decision. Dozens of security products all similarly promise to protect your environment without impeding network performance. How can you determine the best fit for your network? Where can you get nonbiased information on how these products will actually perform in your network?

The good news is that security product testing is evolving, with third party, open security testing organizations emerging


Field Guide #8: How to Simplify and Strengthen Security with Managed XDR

by OptivMay 10, 2022

Managed Extended Detection and Response (MXDR) is the most advanced threat detection and response (D&R) available. But what is MXDR?

Download this guide to — Break down the evolution of D&R Compare MXDR to MDR and XDR Understand how MXDR works Demonstrate how MXDR can improve security results while reducing risk


Optiv MXDR Service Brief

by OptivMay 10, 2022

Optiv Managed XDR (MXDR) automates incident investigation with environment spanning, actionable insights in real-time.

Download this service brief and learn how Optiv MXDR enables you to: Streamline and accelerate detection and response Prioritize threats to address Reduce your attack surface


The Future of Threat Management for GRC

by OptivMay 10, 2022

This GRC Outlook research report discusses the future of Threat Management with Optiv's VP of Advanced Detection and Response, John Ayers.

Download this report and follow along as they discuss: The MXDR magic What happens behind the scenes of Optiv MXDR No. 1 pain remediator for clients The bright future of deploying futuristic security solutions


Report: ICS/OT Cybersecurity 2021 Year in Review

by DragosMay 10, 2022

Dragos is excited to present the fifth year of the annual Dragos Year In Review report on Industrial Control System (ICS)/ Operational Technology (OT) cyber threats, vulnerabilities, assessments, and incident response observations.

The ICS/ OT community has long suffered from more anecdotes on security than insights driven from data and real-world cases given the sensitivity of the subject. A lack of insights into the ICS/OT threat landscape and state of security prevent the community


SUBTOPICS:

Cymulate

For companies that want to manage their security posture against the evolving threat landscape: Cymulate SaaS-based Extended Security Posture Management (XSPM) deploys within an hour, enabling security professionals to continuously challenge, validate and optimize their cyber-security posture end-to-end across the MITRE ATT&CK® framework.

The platform provides out-of-the-box, expert, and threat intelligence-led risk assessments that are simple to deploy and use for all maturity levels, and constantly updated. It also provides an open framework to create and automate red and purple teaming by generating penetration scenarios and advanced attack campaigns tailored to their unique environments and security policies. Cymulate allows professionals to manage, know and control their dynamic environment.


Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


Dragos

Dragos is the industrial cybersecurity expert on a relentless mission to safeguard civilization. In a world of rising cybersecurity threats, Dragos protects the most critical infrastructure (those that provide us with the tenets of modern civilization) from increasingly capable adversaries. Devoted to codifying and sharing our in-depth industry knowledge of ICS/OT systems, Dragos arms industrial defenders around the world with the knowledge and tools to protect their systems as effectively and efficiently as possible.


Optiv

Headquarters: Denver, CO

Optiv is the cyber advisory and solutions leader, delivering strategic and technical expertise to more than 7,000 companies across every major industry. We partner with organizations to advise, deploy and operate complete cybersecurity programs from strategy and managed security services to risk, integration and technology solutions. With clients at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can. At Optiv, we manage cyber risk so you can secure your full potential.