Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Sophos 2022 Threat Report

by SophosJan 21, 2022

As we move into 2022, ransomware shows no signs of slowing down — that's no surprise. What we have seen in the past 18 months, however, is a shift in tactics: targets have shifted to ever-larger organizations, and the business model that dictates how ransomware attacks occur has evolved. It's up to IT professionals to proactively deal with these trends to meet the challenges just on the horizon and beyond. In this report you'll find: The future of ransomware The impact of

  • Sophos
  • Cybersecurity
  • Risk Management/Security
  • IT Strategy
  • Details

Hindsight Cybersecurity: Seven Key Lessons Learned by Breach Victims

by SophosJan 21, 2022

In all walks of life, a mistake is an opportunity to learn and to ensure the same thing never happens again. Cybersecurity is no different.

Fortunately, in this report, Rob Collins, specialist systems engineer for Sophos Managed Threat Response and Rapid Response, shares seven key lessons learned by breach victims to help you better defend your organization and avoid becoming a victim yourself.

Each lesson includes simple recommendations and tips, many of which do not

  • Sophos
  • Cybersecurity
  • Risk Management/Security
  • IT Strategy
  • Details

Minimizing the Risk of Supply Chain Attacks: Best Practice Guidelines

by SophosJan 21, 2022

Supply chain attacks are notoriously difficult to detect. Consequently, many organizations are unprepared to defend against them because they don't know where to start or don't believe themselves important enough to be targeted through the compromise of a trusted partner.

Read this report to learn: How supply chain attacks work 5 best practice guidelines for defending against them The role of cybersecurity technology and services in minimizing supply chain risk

  • Sophos
  • Cybersecurity
  • Security Monitoring
  • Risk Management/Security
  • Details

The Tech Exec’s Ransomware Incident Response Playbook

by Palo Alto Networks I Unit 42Jan 20, 2022

Sooner or later, your business is likely to be hit with a ransomware attack. Perhaps you?ve planned for it, but are you truly prepared? When the time comes, however, the careful planning may not be tailored to a specific incident. In that case, you have to be able to react and adjust in real time. Beyond just knowing whether or not to pay a ransom, you have to be sure your tools, processes, and procedures are adaptable so that during a stressful moment, you?re making the right decisions to


Beyond Spam and Phishing: Emerging Email-based Threats

by Abnormal SecurityJan 18, 2022

Even as enterprises adopt real-time messaging tools and platforms, email remains the hub of enterprise communications. Adversaries are increasingly targeting the enterprise email inbox, and security teams need to look further than just spam and phishing attacks. In this webinar, you?ll learn about different tactics adversaries employ to steal from enterprises, including business email compromise (BEC) and stealing customer information. You will gain insights into how to recognize and defend


The Complete Guide to Kubernetes Security

by Palo Alto Networks l Prisma CloudJan 18, 2022

This e-book explains how to design a security strategy that reinforces the rest of your Kubernetes-based processes. It identifies Kubernetes security challenges from the node up and pinpoints specific solutions for addressing each of them. There is a focus on automated, scalable approaches that will keep Kubernetes-based workloads secure, no matter how large your cluster is or which type of infrastructure you use to host it — on-premises, public cloud, or managed service.

  • Palo Alto Networks l Prisma Cloud
  • Security Monitoring
  • Cloud
  • Details

The Dirty Little Secrets of Business Intelligence: Planning Tomorrow's BI Strategy Today

by enVistaJan 18, 2022

Business Intelligence (BI) uses data mining, data tools, analytics, visualization and collaboration to help organizations make better, more data-driven decisions at speed. In fact, users deploying Microsoft Power BI had a potential return on investment (ROI) of 366 percent, according to a Forrester Consulting Total Economic Impact ™ (TEI) study.

Download this edition of enVista Insights to learn how to:
• Identify and serve key stakeholder with for Business

  • enVista
  • Big Data Analytics
  • Big Data
  • Details

How Salesforce Manages Global Building Operations Across Teams

by FormstackJan 18, 2022

Salesforce's Real Estate Technology team runs a high-volume operation that requires data collection from employees and visitors across 150 locations. They needed a tool that would:
• Streamline the operation
• Create a user-friendly process for accepting and reviewing hundreds of building requests

Read why Salesforce selected Forms for Salesforce to help employees manage operations across their global locations in this case study.

  • Formstack
  • Operating Systems
  • Information Management
  • Details

Adapting to a Digital-Must World: Your Digital Transformation Checklist

by FormstackJan 18, 2022

Need help conquering your digital transformation goals? We know getting started can be hard, and the process can feel overwhelming. Use our digital transformation checklist as a guide to help you prepare for, plan, and implement your digitization goals.

  • Formstack
  • Software Developers
  • Operating Systems
  • Details

The Rise of the No-Code Economy

by FormstackJan 18, 2022

So what is no-code? How can it transform your world of work? Inside this report, discover how no-code is ushering in a brand new economy by creating companies, communities, education systems, and jobs built entirely on or around no-code software and the non-technical business user.

This report includes:
• The definition and history of no-code
• Details on the adoption of no-code tools across industries
• Data from our 2021 No-Code Economy Survey

  • Formstack
  • Software
  • Information Management
  • Details