Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

The Cloud Gets Ready for the 20's

by InformationWeekDec 06, 2019

This IT Trend Report explores how cloud computing is being shaped for the next phase in its maturation. It will help enterprise IT decision makers and business leaders understand some of the key trends reflected emerging cloud concepts and technologies, and in enterprise cloud usage patterns. Key themes include managing multi-cloud and hybrid cloud environments and lessons learned from a four-year project to migrate a major bank from on-premise systems to a new cloud environment.

Here's

  • InformationWeek
  • Cloud
  • Data centers
  • Infrastructure as a Service
  • Software as a Service
  • Cloud Services
  • Platform as a Service
  • Details

Simplify Your Application Security

by WhiteHat SecurityDec 06, 2019

Aimed at helping you simplify your company's application security; this whitepaper offers recommendations to combat some of the most common application security issues experienced by organizations today.

  • Whitehat Security
  • Security Management & Analytics
  • Endpoint Security
  • Details

Cloud Sprawl: It’s Worse Than You Think

by Expanse, Inc.Dec 05, 2019

Organizations today are blind to how many assets they have in the cloud. Many assume they're only in the three major cloud providers (Amazon Web Services (AWS), Google Cloud Platform, and Microsoft Azure). But in practice, most organizations are in ten or more providers. And if you don?t know about all of your cloud instances, you can?t secure them appropriately. Join us on December 5th to learn how to get complete visibility into your cloud infrastructure with the Expanse Internet


Guide to Building Your Vendor Risk Management Program

by SecurityScorecardDec 05, 2019

Tackling the problem of vendor risk is not made any easier with technology solutions being added by the day. Current vendor risk management processes are not equipped to handle the growing demand ofsecurity risk assessmentsfor new and existing third-parties. Download the guide to learn how you can improve yourvendor risk management programto handle the modern risk that lies ahead.

  • SecurityScorecard
  • Risk Management/Security
  • Risk Management
  • Details

Case Study: Modulr

by SecurityScorecardDec 05, 2019

By using SecurityScorecard, Modulr Finance was also able to decrease operational costs, increase objectivity, reduce human error and more. Read the case study.

  • SecurityScorecard
  • Risk Management/Security
  • Risk Management
  • Details

Case Study: Horizon Media

by SecurityScorecardDec 05, 2019

Learn how Horizon Media used SecurityScorecard to make strategic changes to their IT infrastructure and increase cybersecurity hygiene. Read more.

  • SecurityScorecard
  • Risk Management/Security
  • Risk Management
  • Details

Assessing Exposure and Organizational Behavior to the BlueKeep Vulnerability

by SecurityScorecardDec 05, 2019

SecurityScorecard researchers used the BlueKeep event as a way to study organizations' response to this vulnerability over time. Read the report.

  • SecurityScorecard
  • Risk Management/Security
  • Risk Management
  • Details

Gartner's Top 10 Security Projects for 2019 Report

by SecurityScorecardDec 05, 2019

Get your copy of Gartner's Top 10 Security Projects for 2019 report to find out which projects you should implement or improve upon in 2019. Learn more.

  • SecurityScorecard
  • Risk Management/Security
  • Risk Management
  • Details

How to Combat Nation-State Attacks

by Carbon BlackDec 05, 2019

Nation-state attacks are sophisticated cyberthreats from adversaries working directly or indirectly for their own government. Their motivation? To place their nation in a better position against their political enemies. The targets of nation-state attacks range from private hospitals and financial institutions to election infrastructures, making them one of the largest global security threats today.

To help you understand this threat, what it looks like in your environment, and the

  • Carbon Black
  • Cybersecurity
  • Risk Management
  • Details

How to Combat Ransomware

by Carbon BlackDec 05, 2019

Ransomware isn't new—in fact, it's over 30 years old. Attacks date back as far as 1989 and have been the most pervasive cyber threat since 2005, with a dramatic spike in recent years. The resulting costs to targeted businesses are soaring. In fact, according to the 2018 Verizon Data Breach Investigations Report, ransomware has moved from the 22nd most common variety of malware in 2014 to the most common variety in 2018.

It is estimated that, by the end of this year, ransomware

  • Carbon Black
  • Cybersecurity
  • Risk Management
  • Details