Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

How to Use Artificial Intelligence and Machine Learning to Improve Enterprise Security

by Blue HexagonSep 18, 2019

Many cybersecurity vendors today use terms such as ?AI? and ?machine learning? to describe the capabilities of their products. But what exactly do these technologies do, and how can you implement them to improve your everyday IT security processes? In this enlightening Dark Reading webinar, a top expert will offer some useful definitions of terms, and discuss practical applications that could speed your incident response time and improve your use of IT security staff resources

  • Vulnerabilities & Threats
  • Details

Conquering Toll Fraud with Analytics

by Ribbon Communications Inc.Sep 18, 2019

Telecommunications fraud loss was estimated to be a $29 billion problem in 2017, according to the Communications Fraud Control Association.Don?t be caught off-guard; when your UC infrastructure is compromised, you don?t want to be the executive who didn?t find out about it until after losses mount and your company?s reputation is tarnished.

Whether you know or not, it?s quite likely that bad actors have already tried, or are still trying, to gain access to your unified

  • Analytics
  • Telecom
  • Unified Communications
  • SIP
  • Details

Building a Threat Intelligence Program: Research Findings on Best Practices and Impact

by ThreatConnectSep 13, 2019

We surveyed over 350 cybersecurity decision makers about their services, products, and methods. This resulting report found that organizations that are leveraging threat intelligence to combat increasing cyber threats have seen a large business impact. In fact, organizations credit threat intelligence programs with saving businesses an average of $8.8 million over twelve months.

  • ThreatConnect
  • Security Management & Analytics
  • Security platforms
  • Details

SOAR Platforms: Everything You Need to Know About Security, Orchestration, Automation, and Response

by ThreatConnectSep 13, 2019

With a SOAR solution, it's possible to process data and mitigate threats in a single platform. You'll also learn how you can adapt to the adversarial landscape and use automation and orchestration to streamline your organization's security approach.

  • ThreatConnect
  • Security platforms
  • Security Monitoring
  • Details

Threat Intelligence Platforms: Everything You Want to Know, But Didn't Know to Ask

by ThreatConnectSep 13, 2019

Download this ebook to learn how a Threat Intelligence Platform (TIP) can help your organization move faster, collaborate more intently, and make better use of existing tools to aggregate, analyze, and act on threat intelligence. This book also talks about how to effectively use threat intelligence, expected capabilities of a TIP, the future of threat intel, and more. Read to the very end for a TIP checklist.

  • ThreatConnect
  • Security platforms
  • Security Management & Analytics
  • Details

Open Source vs. Commercial Threat Intelligence Platforms

by ThreatConnectSep 13, 2019

In this whitepaper, we discuss the key technical and economic considerations every security team needs when contemplating an open source or commercial threat intelligence platform. It will help you narrow down what your team needs and what solution best fits your cybersecurity strategy.

  • ThreatConnect
  • Security platforms
  • Security Management & Analytics
  • Details

More is Not More: Busting the Threat Intel Feeds Myth

by ThreatConnectSep 13, 2019

It's a common misconception that a large quantity of threat intelligence feeds leads to more effective security. But instead of adding more threat intel feeds, you should incorporate the feeds that provide the most value to your organization's security operations. Download this paper to learn your options when it comes to threat intel feeds; how to evaluate feeds' quality; and which are the right feeds for your organization.

  • ThreatConnect
  • Security Management & Analytics
  • Security platforms
  • Details

Build Your Own SOC or Partner with an MSSP

by BlueVoyantSep 12, 2019

Underprotected companies offer the path of least resistance and the quickest return on investment for a cyberattack. Regardless of company size, the financial risks demand an effective, efficient, and high-end SOC to protect their businesses. In this treacherous environment, organizations need to dramatically improve their security posture. Management must weigh the costs and benefits of building, staffing, and managing their own SOC, or partnering with an MSSP. When making this decision, it is

  • BlueVoyant
  • Security Management & Analytics
  • Security Monitoring
  • Details

Quick Guide to Calculating the Cost of Ransomware

by BlueVoyantSep 12, 2019

In today's threat landscape, organizations need to proactively determine what they are going to do; Pay, Not Pay, or Defend. An important place to start is calculating the financial risks of ransomware. The math is straightforward. The calculations presented in this whitepaper can be used as a starting point. They can be used to facilitate conversations between Security Teams, Business Owners, IT Teams and Senior Management. They can be used to drive more effective security strategies and

  • BlueVoyant
  • Security Management & Analytics
  • Security Monitoring
  • Details

9 Ways Cybercriminals Disrupt Business Operations

by BlueVoyantSep 12, 2019

The cyber battlefield has evolved and become much more complex. For businesses and governments, the fear of a global cyberattack is no longer an abstract thought; it is a stark reality. Businesses face the challenge of protecting their systems and operations from threat actors with sophisticated techniques, tactics, and procedures that are capable of launching a devastating cyberattack. It is essential that companies become more proactive and predictive in mitigating risk. To support businesses

  • BlueVoyant
  • Security Management & Analytics
  • Security Monitoring
  • Details