Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

SANS 2019 Incident Response (IR) Survey: It's Time for a Change

by ExtraHopAug 14, 2019

Curious about the state of incident response worldwide? Interested in expert recommendations for improving your incident team's performance?

In this report, you'll dive deeper into survey results and get suggestions on how to boost breach detection, investigation and remediation by focusing on:

• Eliminating gaps in visibility
• Automating responses to security threats
• Improving communication between SecOps and NetOps teams

  • ExtraHop
  • Risk Management
  • Security Management & Analytics
  • Details

EMA 2019 Report: Bridging the Gap Between NetOps and SecOps

by ExtraHopAug 14, 2019

Security incidents often present themselves as performance problems, and IT teams that respond to security incidents as performance issues will miss opportunities to protect the business from attack.

Today's enterprises recognize that network operations and security operations teams should be partners, not adversaries--but especially in large, well-established organizations, that kind of cultural and process shift is much easier said than done.

In this whitepaper, Enterprise

  • ExtraHop
  • Network & Perimeter Security
  • Security Monitoring
  • Details

DDoS Resilience, Remediation and Recovery: Updating Your Strategy

by NeuStar, Inc.Aug 13, 2019

Most organizations keep back-ups and have basic plans to protect themselves from denial of service attacks. However, most of those DDoS response strategies were long before businesses relied upon cloud services for fundamental operations, before our environments were full of IoT devices requiring network access, and long before the threat of IoT botnets. We are more reliant than ever on network access, and attackers have more powerful tools than ever to cut that access off. So are you ready for


2019 Stats Report: The DevSecOps Approach

by WhiteHat SecurityAug 13, 2019

WhiteHat Security is now a wholly-owned, independent subsidiary of NTT Security. With this strategic development, we are able to combine the global reach of NTT with WhiteHat's deep expertise in application security. As a result, our research now offers the most comprehensive perspective on the current state of application security, as well as recommendations on how to implement DevSecOps effectively.

The 2019 WhiteHat Application Security Statistics report looks at our underlying

  • Whitehat Security
  • Cybersecurity
  • Security Monitoring
  • Details

TitaniumCloud File Intelligence vs. VirusTotal

by ReversingLabsAug 09, 2019

Security teams have a choice! ReversingLabs offers unequalled file intelligence with more total and more current data along with complete query/post privacy and enterprise class support. ReversingLabs also offers an option VirusTotal cannot — a complete onsite malware analysis solution that combines the industry's authoritative file intelligence database with an on-premises malware analysis and threat hunting platform. If your security team is tired of struggling with the limitations of

  • ReversingLabs
  • Cloud Security
  • Security Monitoring
  • Details

The New Threat Intelligence — How Automated Static Analysis Finds the Destructive Objects Existing Solutions Miss

by ReversingLabsAug 09, 2019

Malware continues to increase in sophistication and routinely evades organizations' cyber defenses. It lurks inside networks, often for months, executing or waiting to execute attacks that can cause significant damage. Even though the industry has developed various technologies to bolster detection and response, the situation persists. The 2019 Verizon Data Breach Report results show that the discovery of successful attacks is still measured in months and containment in weeks, meaning average

  • ReversingLabs
  • Cybersecurity
  • Database Security
  • Details

ReversingLabs Titanium Platform

by ReversingLabsAug 09, 2019

Organizations advancing their business through new digital strategies continue to take on brand, financial and information risks due to the growth of malware infected files and objects sourced from the web, cloud, mobile, and APIs. These advanced and destructive objects are armed to circumvent existing antivirus, EDR, email protection, sandbox and threat intelligence solutions leaving companies blind to threats lurking within their network. This is having an impact on the CISO's ability to

  • ReversingLabs
  • Cybersecurity
  • Risk Management
  • Details

The Destructive Objects Playbook

by ReversingLabsAug 09, 2019

Cyberattacks continue to plague organizations worldwide. Many of the largest and most damaging attacks stem from malware-infected files that evade traditional security solutions.

This shows that attackers are at every gate, always trying to get their destructive objects through. It's a growing onslaught that, when successful, causes enormous disruption and damage.

  • ReversingLabs
  • Cybersecurity
  • Risk Management
  • Details

Strategies for Minimizing Phishing Attack Risks

by ReversingLabsAug 09, 2019

The Phishing Attack Situation

There's no way around it. Sending emails with attachments, downloading web files and using shared folders are a part of how we conduct business and that's not going to change.

To hackers, these online communication modes are like highways into your network and they drive on them every day. It's why these paths are by far the largest source of malware attacks in general, and most important, malware that successfully evades defenses and makes its

  • ReversingLabs
  • Cybersecurity
  • Risk Management/Security
  • Details

7 Threats & Disruptive Forces Changing the Face of Cybersecurity

by Dark ReadingAug 08, 2019

In this Tech Digest, Dark Reading examines the research revealed at Black Hat USA and takes a look at some of the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today. As digital disruption and advances in emerging technology such as AI, the Internet of Things, and automation enmesh IT into every part of society, cybersecurity grows more important than ever. Read this Report to learn more about the biggest emerging threats and disruptive forces

  • Dark Reading
  • Cybersecurity
  • Security Monitoring
  • Endpoint Security
  • Details