Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Strategic CIO

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







API Security 101 Whitepaper

by Noname SecurityJan 25, 2022

APIs are everywhere in the modern IT world, and the volume of API traffic is only expected to grow. However, despite the power and popularity of APIs, many organizations struggle with API security. When it comes to securing APIs, traditional application security controls are not a complete solution.

In this API security white paper, we will cover: APIs as a widely adopted integration tool Two elements needed to deliver APIs API security challenges (even those different than


Cyber Attack Simulations vs Pen Testing vs Vulnerability Scanning

by CymulateMay 18, 2022

Between Pen-Testing, Vulnerability Scanning and cyber attack simulations, only one provides the proper education your team needs to prevent attackers from gaining an initial foothold. How else can cyber attack simulations minimize risk? Read the comparison here.


Identity Sprawl and the Toll of Enterprise Identity Debt

by Radiant LogicNov 02, 2021

This white paper is based on research conducted by Aite-Novarica Group between July and September 2021. Key takeaways include: Financial services companies have made significant investments in identity and access management solutions, but still maintain multiple disjointed and isolated identity data stores Fragmented identity repositories can increase risks during acquisitions The Radiant Logic Identity Fabric Data approach can radically simplify complex identity management


Quick Guide to Power Distribution

by EatonMar 18, 2020

Rack power distribution units, A.K.A. rack PDUs, are a key component to any IT environment. The right unit can allow you to monitor and control the power at the individual outlet, switch power on and off, remotely shut down the power during an emergency power outage, or simply distribute power efficiently and safely. Learn more about rack PDUs and the modern benefits they can have for your business.


[Slideshow] 10 Mistakes End Users Make That Drive Security Managers Crazy

by Dark ReadingApr 27, 2018

We pinpointed 10 common ways employees mishandle - and inadvertently breach - an organization's security. Find out what they are here.


[Slideshow] 7 Key Stats that Size Up the Cybercrime Deluge

by Dark ReadingApr 27, 2018

Now that we've got a couple of months from this year in the rearview mirror, security researchers have had enough time to crunch the numbers from 2017. That means a raft of new reports analyzing last year's cybersecurity data with updated telemetry on the threat landscape, economic impact, and defense problems facing the cybersecurity industry. Here are some of the most illuminating highlights.


[Slideshow] 7 Steps to a Smooth, Secure Cloud Transition

by Dark ReadingApr 27, 2018

If you're thinking with a cloud-first mindset, you should be making sure all the right boxes are checked before you make the leap. Here, security experts highlight the most important steps to keep in mind while moving to the cloud. Find out what they had to say.


[Strategic Security Report] Assessing Cybersecurity Risk

by Dark ReadingJun 30, 2017

As cyber attackers become more sophisticated and enterprise defenses become more complex, many enterprises are faced with a complicated question: what is the risk of an IT security breach? This report, one of three to come out of Dark Reading's annual Strategic Security Survey, delivers insight on how today's enterprises evaluate the risks they face. In addition to providing survey data on the implementation of risk metrics and best practices, this report offers a look at security professionals'


[Strategic Security Report] Navigating the Threat Intelligence Maze

by Dark ReadingDec 15, 2017

Over the past few years, enterprises have gained access to vast new resources of information about cybersecurity threats. New services that collect information about external threats are being combined with existing technologies for analyzing security events. Enterprises are better able to assess potential threats by correlating data from multiple sources to measure risk and prioritize defenses. How are organizations harnessing these new information resources? In this survey, IT security


10 Best Practices That Could Reshape Your IT Security Department

by Dark ReadingOct 25, 2018

This is Dark Reading's November Tech Digest, explores ten best practices that could reshape IT security departments.

IN THIS REPORT: 10 Best Practices That Could Reshape Your IT Security Department Managing Data the Way We Manage Money The Cloud Security Conundrum: Assets vs. Infrastructure Think Like an Attacker: How a Red Team Operates


SUBTOPICS:

Cymulate

For companies that want to manage their security posture against the evolving threat landscape: Cymulate SaaS-based Extended Security Posture Management (XSPM) deploys within an hour, enabling security professionals to continuously challenge, validate and optimize their cyber-security posture end-to-end across the MITRE ATT&CK® framework.

The platform provides out-of-the-box, expert, and threat intelligence-led risk assessments that are simple to deploy and use for all maturity levels, and constantly updated. It also provides an open framework to create and automate red and purple teaming by generating penetration scenarios and advanced attack campaigns tailored to their unique environments and security policies. Cymulate allows professionals to manage, know and control their dynamic environment.


Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


Eaton

Eaton is a power management company made up of over 97,000 employees, doing business in more than 175 countries. Our energy-efficient products and services help our customers effectively manage electrical, hydraulic and mechanical power more reliably, efficiently, safely and sustainably. To help you maintain business continuity and prevent downtime, Eaton offers a comprehensive portfolio of backup power and distribution equipment, protecting you from a host of threats, including power outages, surges and lightning strikes. Eaton also provides a suite of power management solutions to enable you to monitor and control your power infrastructure.


Noname Security

Noname Security is the only company taking a complete, proactive approach to API Security. Noname works with 20% of the Fortune 500 and covers the entire API security scope across three pillars — Posture Management, Runtime Security, and Secure API SDLC. Noname Security is privately held, remote first with headquarters in Palo Alto, California, and an office in Tel Aviv and Amsterdam.


Radiant Logic

Radiant Logic, the enterprise Identity Data Fabric company, provides the cornerstone of complex identity architectures in today's digital world. With Radiant, it's fast and easy to put identity data to work, connecting many disparate data sources across legacy and cloud infrastructures in real-time, without disruption. Their solution creates a solid identity foundation that speeds the success of initiatives, including single sign-on, M&A integrations, identity governance and administration, cloud directory deployments, hybrid and multi-cloud environments, customer identity and access management, and more. From the Fortune 1000 to government agencies, organizations across the globe rely on Radiant to deliver meaningfully faster time-to-value and unprecedented IT agility, while building a secure, future-proof identity infrastructure that meets real-world business demands.