Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Creating and Maintaining Effective Metrics for Assessing Enterprise Security

by Synopsys Inc.Oct 15, 2019

When IT security leaders speak with top management, they're typically asked two questions: How safe is the organization from cyber threats How well are enterprise defenses working During this webinar, top experts will discuss key metrics for assessing security posture, as well as the performance of the security team. You'll learn about some useful ways to measure cybersecurity effectiveness, and how to use those metrics to demonstrate new risks as well as the ongoing performance of your

  • Security Management & Analytics
  • Details

2019 Threat Hunting Report

by DomainToolsOct 14, 2019

Based on a comprehensive survey of cybersecurity professionals in our 400,000-member Information Security Community on LinkedIn, the 2019 Threat Hunting Report confirms that organizations are increasing their operational maturity and investments in threat hunting. Organizations realize that proactively uncovering security threats pays off with earlier detection, faster response, and effective denial of future exploits that can damage business operations. This survey also includes information

  • DomainTools
  • Cybersecurity
  • Risk Management
  • Details

Developing a Threat Hunting Program: Checklist: A 5-Step Guide

by DomainToolsOct 14, 2019

This 5-step guide will help you understand how to conduct internal and external threat hunting activities in a programmatic manner as well as help organizations new to threat hunting create the foundations for conducting threat hunts.

  • DomainTools
  • Cybersecurity
  • Risk Management/Security
  • Details

2019 SANS Incident Response Survey Report

by DomainToolsOct 14, 2019

Information security rarely has a dull day. The past year delivered significant data breaches, impacting industries ranging from hospitality to legal to social media. We've seen a continuation of financially motivated threats, such as business compromise (BEC), which continue to pillage and drain corporate bank accounts. Ransomware has brought multiple cities to their knees, earning threat actors significant funds in the process. Coupled with the ever-looming threat that a nation-state-sponsored

  • DomainTools
  • Cybersecurity
  • Security Management & Analytics
  • Details

Cyber Resilience: How To Survive A Cyber Attack and Recover Faster

by OnapsisOct 10, 2019

For your business to survive a security incident, it needs to get back to doing business as soon as possible --back to serving customers, cutting paychecks, and running production lines. If your organization were hit by a major incident, how badly would your operations be interrupted and how many customers would you lose for good? In this webinar, learn how to prepare today, to make your business more resilient to cyber attacks tomorrow.


How is the Latest Uninterruptible Power Supply (UPS) Technology Designed for Edge and Cloud Computing?

by Schneider Electric Motion USAOct 09, 2019

Edge Computing and Cloud are two key pillars of new internet architectures. Thus, you must rethink the infrastructure solutions you deploy to support these environments, specifically Uninterruptible Power Supply (UPS) technologies. Organizations across numerous verticals ? retail, manufacturing, education, and healthcare, to name a few ? are finding that unique requirements are critical to operate data centers, including edge and micro data centers.


Future-Proofing Your Next-Generation Firewall

by CiscoOct 09, 2019

The Next-Generation Firewall (NGFW) has been the cornerstone of enterprise network security for more than a decade. With the onset of digital transformation -- such as mobility, cloud computing, and software-defined networking ? one might conclude that the relevance of NGFW would be waning. However, that couldn't be further from the truth. NGFW is transforming and is becoming increasingly crucial to the success of enterprise cybersecurity programs. Not only is the NGFW providing more


Phishing Threat and Malware Review 2019

by CofenseOct 09, 2019

You've got mail. Look out. This report is about evolution, how phishing emails and malware are in a state of constant flux. But one thing hasn't changed: phishing is still the #1 cyber-attack vendor. The vast majority of breaches begin with malicious emails or other social engineering and most malware is delivered by email.

Download this report to learn more about:

• Threats that made it through the email gateway
• Rapid changes in Emotet (aka Geode)
• The

  • Cofense
  • Security Management & Analytics
  • Cybersecurity
  • Details

Getting Started With Emerging Technologies

by InformationWeekOct 07, 2019

Looking to help your enterprise IT team ease the stress of putting new/emerging technologies such as AI, machine learning and IoT to work for their organizations? There are a few ways to get off on the right foot. In this report we share some expert advice on how to approach some of these seemingly daunting tech challenges.
Here's what's inside: How to Get Hands-On with Machine Learning: If you really want to understand the capabilities and limitations of machine learning, you have to

  • InformationWeek
  • IT Strategy
  • Risk Management/Security
  • Details

SANS Review: Investigate Attacks on Critical Assets with Network Detection and Response

by ExtraHopOct 03, 2019

"By emphasizing ease of use, deep analytics capabilities, built-in intelligence and search tools and rapid event triage, many SOC teams could hit the ground running quickly with Reveal(x)."
- Dave Shackleford, SANS Institute Instructor

Learn how Reveal(x), cloud-native network detection and response for the hybrid enterprise, addresses the following core security areas as identified by the SANS Institute in this 12-page product review:

• Deployment model and

  • ExtraHop
  • Security Monitoring
  • Security Management & Analytics
  • Details