Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

SANS 2019 Threat Hunting Survey Report

by MandiantMay 29, 2020

This 2019 SANS Threat Hunting Survey Report aims to help organizations understand what threat hunting is, why it is essential to protect their organizations, and how novice and experienced hunters can improve their processes.

The report explores the differing: Definitions of threat hunting Methodologies of performing threat hunting Spending priorities and training needs Tools and system data needed for a successful hunt Effectiveness of hunting practices

  • Mandiant
  • Cybersecurity
  • Security Monitoring
  • Details

Case Study: Validating Security & Reducing Risk

by MandiantMay 29, 2020

The case study explores how one of the largest healthcare providers in the U.S. validates security protocols and protects critical assets with an effective security validation program that utilizes automation and an intelligence-driven approach to mitigate risk, optimize controls, and communicate value.

This case study and accompanying video covers: The challenges of cybersecurity for healthcare organizations Measuring and monitoring the efficacy of security tools Reducing cyber risk

  • Mandiant
  • Security Monitoring
  • Risk Management/Security
  • Details

Red Team Realities

by Revolutionary SecurityMay 28, 2020

Red Team is an exciting term, but it can be misconstrued. How do you know when it?s the right fit for your organization? Using real-world anecdotes, this webinar will illustrate how to navigate a decision-making process aligned to use cases and desired outcomes tailored to your organization's needs. Listen as we discuss the different levels of cybersecurity assessments, and help you determine which one is right for your organization (hint: it's in the title).


title

by IBMMay 22, 2020

Virtual eventsare growing in popularity, especially as the world continues to deal with the novel coronavirus. Fortunately, modern technology has made it possible for companies to host amazing online events that rival in-person versions, leading to many benefits for both event planners and attendees alike. In this article, we take a deep dive into what virtual events are and why they're worth your time. Then we share 20 unique ideas you can use to host an amazing virtual event today. For more


Assess your Security Effectiveness

by CyCognitoMay 22, 2020

Conducting an organizational self-assessment of the strengths and weaknesses of your cybersecurity program is a critical process that should be an ongoing activity for every organization.

By establishing a baseline security evaluation of your cybersecurity effectiveness, you can measure your progress over time and implement plans to better align your program to your business priorities. This helps you improve your security program and ensure that investments in people and technology

  • CyCognito
  • Security Management & Analytics
  • Risk Management
  • Details

The State of IT and Cybersecurity Operations

by ExtraHopMay 20, 2020

As companies tighten their belts, the need for coordination between IT and Cybersecurity Operations has never been more urgent. Now is the time to align organizational priorities and budgets. Dark Reading recently took a measure of the relationship between IT and Security teams. Join us as we discuss the survey, share it's findings and review best practices for CIOs and other leadership roles.


E911 Support for Microsoft Teams in the Enterprise and Beyond

by Intrado IncMay 20, 2020

Enterprise communications are rapidly evolving towards Unified Communications (UC) technologies, especially in a time when remote working is significantly on the rise. With Microsoft Teams trumping the list of collaboration platforms, enterprises are seeing the immediate benefits of moving their communications deployments to the cloud while users take advantage of the wide range of UC capabilities, including Microsoft?s latest Dynamic E911 feature. One of the most important functionalities,


Mandiant Security Effectiveness Report 2020

by MandiantMay 15, 2020

The Mandiant Security Effectiveness Report 2020 explores cyber security performance across enterprise production environments and reveals how well organizations are protecting themselves against cyber threats.

Download the report to learn: Why a majority of tested attacks successfully infiltrate enterprise environments without detection The fundamentals of security validation and why it's so critical How to improve the effectiveness of security controls

  • Mandiant
  • Security Monitoring
  • Security platforms
  • Details

Automate Testing Using MITRE ATT&CK® with Verodin Security Validation

by MandiantMay 15, 2020

Organizations are increasingly adopting MITRE ATT&CK® as a foundational element to their security programs. The Automate Testing Using MITRE ATT&CK® with Verodin paper provides organizations with a clear understanding of how security validation technology enables organizations to automate their ATT&CK-based effectiveness programs to optimize their defenses.

The white paper covers: The challenges of ATT&CK tactical implementation Emulation vs simulation Behavioral testing

  • Mandiant
  • Security Monitoring
  • Security Management & Analytics
  • Details

SANS 2020 Top New Attacks and Threat Report

by MandiantMay 15, 2020

In this paper, SANS Director of Emerging Security Trends John Pescatore highlights key themes from analysis of new attack techniques presented by SANS at the RSA 2020 Conference.

The paper includes: An overview of the top new attacks and threats Insight into overall cybersecurity trends on both the offensive and defensive sides Advice on the steps enterprises must take to evolve critical skills, processes and controls to mitigate current and future risks

  • Mandiant
  • Cybersecurity
  • Security Monitoring
  • Details