Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

The State of Endpoint Security

by Dark ReadingMar 05, 2021

It is often said that the end user is cybersecurity's weakest link. At no time has that axiom been more prominent than in 2020, when the COVID-19 pandemic turned millions of office employees into home workers.

As a new year begins, what are enterprises doing to strengthen end user security, and the systems and devices that support those end users? How are enterprises securing mobile devices and other end-user-owned systems? How are organizations changing the way they build security

  • Dark Reading
  • Cybersecurity
  • Endpoint Security
  • Details

Successful Strategies for Digital Transformation

by InformationWeekMar 05, 2021

Companies have always been revamping product lines and sales strategies through business transformation, but a new approach that better leverages technology and automation has transformed, accelerated, and optimized through digital transformation. Implementing artificial intelligence for automating supply chains or cloud computing for streamlining data flows are of course important, but a true digital transformation strategy has to include a reassessment of elements such as corporate culture,

  • InformationWeek
  • Cloud Infrastructure
  • Unified Communications
  • Details

Optimizing App Performance in the Cloud

by StackStateMar 04, 2021

Today's hybrid cloud architectures render traditional application performance troubleshooting and monitoring methods obsolete. Compounding matters, the wide-scale use of microservices and containers, and the adoption of continuous integration (CI) and continuous delivery (CD) principles mean constant change making it increasingly harder to pinpoint issues. During this Network Computing webinar we?ll discuss these issues and more.


Ten Keys to Better Security Data Analysis

by ExtraHopMar 03, 2021

If you?re swimming in security incident data, alerts, and log files, you?re not alone. How can you aggregate that data and analyze it quickly, to identify sophisticated or obfuscated attacks? In this webinar, experts discuss ways to effectively collect and analyze large amounts of security data, enabling you to surface the threat and exploit information that you need to defend your enterprise. Speakers will also offer recommendations on how to automate some of that data analysis, so that you


Tech Insights: Detecting and Preventing Insider Data Leaks

by Dark ReadingMar 03, 2021

While malicious insiders often get the headlines, most enterprise data leaks are accidental — caused by end users who fail to follow corporate security policy or try to work around it. In this Tech Insight, experts discuss methods for detecting and preventing risky or anomalous end user behavior, as well as methods for preventing unauthorized access and transfer of data by end users. You'll also get insight on the evolution of technology used to prevent accidental data leaks, such as data

  • Dark Reading
  • Cybersecurity
  • Database Security
  • Security Monitoring
  • Details

How Enterprises Are Developing Secure Applications

by Dark ReadingMar 03, 2021

One of the most common ways cybercriminals breach enterprises is by finding security vulnerabilities in the applications they use. The last year delivered a plethora of security challenges. Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices. Additionally, the increase in attacks by cybercriminals who took advantage of the expanded attack

  • Dark Reading
  • Security platforms
  • Security Monitoring
  • Cybersecurity
  • Security Management & Analytics
  • Details

2020 Trustwave Global Security Report

by TrustwaveMar 02, 2021

Many organizations are moving to cloud-based IT infrastructures as a means of solving scalability, performance, availability, and cost challenges. However, scaling security in tandem with their digital transformation often gets overlooked, leaving sensitive data and assets open to risks. Trustwave wants to help ensure your security posture is up-to-date and keeps pace with your company's digitization. This report shares:

• Best practices
• Insights on cloud data

  • Trustwave
  • Database Security
  • Cybersecurity
  • Details

Immuta Data Engineering Survey: 2021 Impact Report

by ImmutaMar 02, 2021

We're on the verge of a perfect storm for modern data access governance. As organizations lean into data and the cloud, new research shows that the majority will adopt multiple cloud compute technologies within the next two years. As a result, data teams will need a modern framework, architecture, and suite of tools to make their cloud data platforms work together efficiently and securely.

This report highlights the current and future state of data engineering and DataOps, including

  • Immuta
  • Risk Management/Security
  • Strategic CIO
  • Details

Automated Data Governance 101

by ImmutaMar 02, 2021

When it comes to the enterprise, data science and data governance programs are built on competing objectives, and enterprises have no choice but to try to satisfy both demands. Compliance and privacy programs, for example, require increasingly strict limitations on who can use what data and why, thanks to increasing regulations on data. On the other hand, data scientists need access to as much data as possible, as quickly as possible — otherwise their analysis could fall flat.

  • Immuta
  • Risk Management/Security
  • Strategic CIO
  • Details

How to Avoid the Challenges of Cross-Platform Data Access Governance

by ImmutaMar 02, 2021

Within the next two years, 75% of organizations expect to be "primarily" or "entirely" cloud-based, and more than half plan to adopt two or more cloud data platforms. This shift is not necessarily unexpected — but it is happening faster than industry analysts predicted. This white paper dives deep into the future of cloud data ecosystems to uncover:

• How the rise of DataOps and cloud data access are forcing data teams to evolve
• The biggest obstacles facing data

  • Immuta
  • Risk Management/Security
  • Strategic CIO
  • Details