Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

2020: Threats in Review

by DarktraceJan 15, 2021

The sudden and unforeseen transition to remote and hybrid working at the start of 2020 has had profound implications on the cyber-threat landscape. This report explores the key threat trends that emerged as a result: SaaS account takeover Email 'fearware' attacks A resurgence in server-side attacks Continued rise of ransomware Discover eight cyber-attacks that evaded other security tools but were caught in real time by Darktrace AI.

  • Darktrace
  • Cybersecurity
  • Risk Management/Security
  • Details

Robotic Processing Can Automate Your Business Processes

by Micro FocusJan 14, 2021

Robotic process automation (RPA) is no longer confined to the domain of scientific research and advanced robotics ? it?s swiftly becoming a valuable enterprise technology platform for advancing business process automation. Processes such as inventory management, financial reporting, service desk management, and more can be elevated and simplified with zero-touch automation. RPA transforms such previously manual tasks as self-service catalog ordering, updating HR information in multiple


Robotic Processing Can Automate Your Business Processes

by Micro FocusJan 14, 2021

Robotic process automation (RPA) is no longer confined to the domain of scientific research and advanced robotics ? it?s swiftly becoming a valuable enterprise technology platform for advancing business process automation. Processes such as inventory management, financial reporting, service desk management, and more can be elevated and simplified with zero-touch automation. RPA transforms such previously manual tasks as self-service catalog ordering, updating HR information in multiple


Putting the Secs Into SecDevOps

by VeracodeJan 13, 2021

DevOps practices and technologies have changed the way software is developed, written, and run. But how does your application development team build security into its processes? In this webinar, experts discuss the integration of security and DevOps ? sometimes called SecDevOps or DevSecOps ? and how it can make your applications not only more flexible, but more secure. You?ll also get advice on how to bring your security team and app dev team together through common tools and practices


Beyond Bots: How AI Is Driving Agent Productivity and Service Quality

by VonageJan 13, 2021

The pandemic has driven unprecedented contact center traffic levels, and has fundamentally changed business to the point that volumes will likely never return to pre-COVID levels. To handle the greater burden without adding more agents, your contact center will have to get smarter about driving customer self-service and agent productivity?and that means AI. In this webinar, the contact center industry?s leading analyst will discuss the AI-driven features and functions that generate the


Improve MITRE ATT&CK Test Results for Endpoint Security Using Deception

by Attivo NetworksJan 13, 2021

As part of its support for ATT&CK®, MITRE recently began evaluating vendor products, as a neutral authority, by testing the ability of specific solutions to detect inbound attacks based on the framework. While MITRE does not rate or recommend tools, the methodology serves as a useful benchmark for comparison. MITRE's evaluation methodology and evaluation results are all publicly available on the MITRE website.

Using this data, Attivo Networks® conducted a study to evaluate

  • Attivo Networks
  • Endpoint Security
  • Security Management & Analytics
  • Details

Attivo Networks MITRE Shield Mapping

by Attivo NetworksJan 13, 2021

MITRE has launched a knowledge base named Shield that captures capabilities surrounding Active Defense and adversary engagements. The very first publication of this knowledge base is in the form of a matrix listing capabilities for Active Defense. Shield complements the MITRE ATT&CK knowledgebase (Adversarial Tactics, Techniques, and Common Knowledge), which is a highly-regarded tool in the Threat Intelligence Community for modeling cybersecurity threats. From a defender's perspective, the

  • Attivo Networks
  • Endpoint Security
  • Security Management & Analytics
  • Details

Accelerating SolarWinds Incident Response for Rapid Lateral Movement Detection

by Attivo NetworksJan 13, 2021

The SolarWinds breach is a prime example of an ongoing supply chain breach, and one should be aware that this has happened in the past and will happen again. As with any breach, discovering an attacker inside the network is extremely alarming. The focus should be to detect the attacker's attempts to move laterally in the network, evaluate their privileges, minimize their window of opportunity, and shut them out as fast as possible. This latest compromise with SolarWinds has magnified the impact

  • Attivo Networks
  • Endpoint Security
  • Security Management & Analytics
  • Details

Attivo Networks in a Zero Trust Architecture

by Attivo NetworksJan 13, 2021

As organizations increasingly move to cloud services, have more work locations, adopt Bring-Your-Own-Devices policies, and deploy Internet of Things (IoT) devices into their networks, their traditional way to protect a network perimeter must change. The castle-and-moat model of hardening network perimeters to prevent a compromise can no longer effectively provide security in a world of increasingly advanced and sophisticated threats. The Zero Trust model of security arose to address these

  • Attivo Networks
  • Endpoint Security
  • Security Management & Analytics
  • Details

Calculating ROI for Attivo Deception and Concealment Technology

by Attivo NetworksJan 13, 2021

Today's information security landscape demands a layered defense but justifying the value of any single security control is always a challenge. As security professionals, CFOs, and other vital decision-makers recognize, there is no such thing as a silver bullet or a one-size-fits-all solution.

However, as shown by evaluating the Attivo solutions with the MITRE ATT&CK® and Shield frameworks, there is a demonstrable boost in performance and detection coverage.

Attivo's

  • Attivo Networks
  • Endpoint Security
  • Security Management & Analytics
  • Details