Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Anatomy of a Modern Phishing Attack

by Duo SecurityFeb 26, 2021

Phishing attacks can lead to credential theft, unauthorized access to sensitive systems, and data breaches of confidential information. This guide covers the anatomy of a phishing attack using a real life case study of a popular company that was breached and how it could have been prevented.

  • Duo Security
  • Security
  • Security Monitoring
  • Details

How to Build Your Incident Response Plan

by ThycoticFeb 26, 2021

What will you do when a breach is discovered?

Start here to develop your own proactive, coordinated incident response plan.

You need a through and robust incident response plan to help prevent a cyberattack from turning into a cyber catastrophe. Read this whitepaper to learn: Steps to take before an incident occurs to make sure people are prepared to act Indicators of compromise that help you discover a cyberattack or breach immediately Actions to help you contain the damage

  • Thycotic
  • Cybersecurity
  • Risk Management/Security
  • Details

How Elite Analyst Teams are Transforming Security with Threat Reconnaissance

by Team CymruFeb 24, 2021

Recent high profile Advanced persistent threat (APT) breaches have highlighted not only the need to see your whole attack surface from the attackers? perspectives, but the need to get ahead of these threats by monitoring threat actor infrastructures as they evolve. Organizations in a variety of high-risk industries continually face sophisticated threat actors, and many have fundamentally changed their organizations? approach to security by implementing forward-leaning threat reconnaissance


Definitive Guide™ to Endpoint Privilege Management

by ThycoticFeb 22, 2021

Your endpoints (and users) have left the office. Here's your guide to protecting them everywhere.

As endpoints such as laptops, tablets, and phones have replaced physical office spaces, all users (not just IT) have to be considered privileged users—and prime targets for attackers. This 48-page Definitive Guide to Endpoint Privilege Management explains in straightforward language what you can do to protect your endpoints for users, applications, and services by applying the

  • Thycotic
  • Endpoint Security
  • Security Management & Analytics
  • Details

How Secure Are Your Endpoints?

by ThycoticFeb 22, 2021

To secure Windows endpoints against attack, it helps to think like a cyber criminal

Malicious hackers look for the cheapest, fastest, stealthiest way to achieve their goals. Windows endpoints provide many opportunities to gain entry to IT environments and access sensitive information.

The ethical hacking community has created numerous tools and techniques to help organizations better secure their Windows environments. This eBook reveals them.

You'll learn

  • Thycotic
  • Endpoint Security
  • Security Management & Analytics
  • Details

The Failures of Static DLP and How to Protect Against Tomorrow's Email Breaches

by EgressFeb 18, 2021

Data breaches caused by outbound email are prolific. In the last 12 months, 93% of organizations experienced security incidents where email use has put sensitive data at risk. And these are not one-off occurrences. In fact, an organization of just 250 employees experiences an average of 180 incidents every year that put sensitive data at risk. That's one every 12 working hours.
Viewed through this lens, it is not an understatement to say that legacy email DLP technologies have failed you.


High Performance Applications with the Dominion KX III

by RaritanFeb 18, 2021

Broadcast, control room, government, military and other users of high performance applications face several challenges when it comes to remote access and control. They require ultra-fast switching, high definition video, low latency, and support for dual video and monitors. In addition, IT, engineering, and other departments also require 24/7 access to these computers to make sure if something does go wrong, it can be fixed quickly.

Learn more here.

  • Raritan
  • Network and Systems Management
  • Infrastructure
  • Details

How a Trading Floor Continues its Operations During COVID-19 Lockdown

by RaritanFeb 18, 2021

When the pandemic hit the world and people were forced to stay at home in order to stay safe and minimize the number of casualties, a major bank faced serious dilemmas on how to let its floor traders continue their work.

Read how Raritan was able to help.

  • Raritan
  • Network and Systems Management
  • Infrastructure
  • Details

MontanaPBS Shifts to Agile Broadcasting with Help from Raritan KVM Solutions

by RaritanFeb 18, 2021

PBS Television Station Improves Content Delivery

When the award-winning Public Broadcasting Service affiliate in Bozeman, Montana, moved to a new software-defined broadcast system, it turned to Raritan for tools for easier access to the new system and for managing the stations IT infrastructure. "Uniform and reliable access to systems and ease of use" make the KX III switch and User Station a winning combination. Broadcast operations, Engineering, and IT personnel now have anytime -

  • Raritan
  • Network and Systems Management
  • Infrastructure
  • Details

Protecting Your Enterprise's Intellectual Property

by Code42Feb 17, 2021

Cyber attackers can scrape by stealing personal information and credentials, but the ?big score? is intellectual property theft. Attacks on IP require a level of sophistication that most enterprises have never encountered before ? is your cybersecurity team ready to face them? In this webinar, you?ll learn about the techniques and tactics that cybercriminals use to crack IP, and how your organization can detect and defend itself against these sophisticated, targeted attacks.