Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Customer Case Study: Omada Health and ZenGRC

by ReciprocityJul 02, 2020

Omada Health, one of the largest digital healthcare companies in the world, needed to meet stringent personal health information (PHI) standards that spreadsheets just couldn't keep up with.

Download this case study to learn how Omada Health:

• Became the first digital health company to achieve certification with a number of security frameworks (including SOC 2)
• Manages the risks and vulnerabilities associated with vendors
• Stays compliant with

  • Reciprocity
  • Risk Management/Security
  • Network & Perimeter Security
  • Details

Why Videoconference Recordings May Be Your Next Big Security Risk

by PanoptoJul 01, 2020

Every day sensitive information is shared in millions of video conference sessions. For convenience and reference, more individuals are recording these sessions. While video conferencing solutions offer rich recording capabilities, almost all provide minimal playback and sharing experiences. This drives many individuals to download and then share the recording through public sharing services like Dropbox and Youtube, neither of which meet organizational security and privacy standards.

  • Video Conferencing / Telepresence
  • Details

Vendor Risk Management: Why Your Business Needs It

by ReciprocityJul 01, 2020

While the risks of vendors are not new to most CISOs, our current business environment has expanded those risks dramatically.

This e-book will explore:

• First, why are vendor risks proliferating--why now, and where do they come from?
• Second, what steps are necessary to manage vendor risks?
• Third, how can CISOs and compliance officers implement those steps in a practical way, so you don't spend all your time chasing vendors with risk management

  • Reciprocity
  • Risk Management
  • Security Management & Analytics
  • Details

5 Ways to Get Started with Artificial Intelligence and Machine Learning

by Dell Technologies and IntelJul 01, 2020

The time to get started with artificial intelligence (AI) and machine learning (ML) is now. Organizations across industries -- as well as your competitors, suppliers and partners -- are using the technologies to automate their processes, augment existing capabilities, and improve operations. All the while, they are transforming key functions such as sales and marketing, risk mitigation, supply chain management, and manufacturing. Are you ready to get started? Download this report for five main

  • Dell Technologies and Intel
  • Virtualization
  • Data centers
  • Details

Special Report: Computing's New Normal, a Dark Reading Perspective

by Dark ReadingJul 01, 2020

The COVID-19 pandemic created new models of computing almost literally overnight.

This special report examines how IT security organizations have adapted to this "new normal" of computing and what the long-term effects will be. Read the report and get a unique set of perspectives on issues ranging from new threats and vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.The information submitted is collected by both Informa Tech

  • Dark Reading
  • Cybersecurity
  • Security Management & Analytics
  • Details

IT Automation: Scaling to the Future

by Juniper NetworksJun 30, 2020

Increasingly, IT organizations are deploying technologies that take manual work out of the picture and replace them with processes that automate network and systems control. In this Network Computing Webinar, our experts will examine the layers of automation and orchestration in IT operations, and how they can provide high availability and greater scale for modern applications and business demands.

The Threat From the Internet – and What Your Organization Can Do About It

by CyCognitoJun 30, 2020

For most enterprises, the increasing use of the Internet has created new business opportunities, greater efficiencies, and a green field for innovation. But growing use of the Internet is also increasing the risk of cyber attack. In recent years, online attackers have launched a wide range of Internet-borne attacks, ranging from DDoS to DNS-based exploits to infiltration of commercial websites. And with the world relying more heavily on Web-based communications during the COVID-19 pandemic, new

The Value of Threat Intelligence with DomainTools: Identify Threats 82% Faster

by DomainToolsJun 29, 2020

There is an increasing chasm between the number of qualified cybersecurity professionals and the number of people needed to fill those roles. DomainTools is a vendor that seeks to address these challenges by offering context rich threat intelligence solutions. DomainTools offerings involve using indicators, including domains and IP addresses, to develop risk assessments, profile attackers, guide investigations, and map cyber activity to attacker infrastructure.

Download this white

  • DomainTools
  • Cybersecurity
  • Security Management & Analytics
  • Details

What is NDaaS?

by CyGlass Inc.Jun 26, 2020

Network Defense as-a-Service (NDaaS) simply and effectively identifies, detects, and responds to threats to your network without requiring any additional hardware, software, or people.

Download this datasheet to learn:
• Why you don't need to hire expensive cybersecurity analysts or purchase clunky hardware to secure your company's networks
• The different components of an NDaaS service offering
• How NDaaS can help secure your company's people, data,

  • CyGlass Inc.
  • Network & Perimeter Security
  • Security Monitoring
  • Details

Case Study: Netskope and Reciprocity

by ReciprocityJun 24, 2020

Netskope, a leading security cloud company with offices in six countries, needed a compliance management solution that was able to:

• Simplify and centralize risk and compliance
• Formalize monitoring and reporting
• Provide out of the box integrations with leading business and infosec applications

  • Reciprocity
  • Risk Management
  • Security Monitoring
  • Details