Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

How to avoid a data breach

by 1PasswordDec 06, 2021

Cyberattacks don't discriminate. In fact, 80% of organizations say they're unprepared for a cyberattack.

Do you know how to close the security gaps that can lead to a data breach?

This guide will: Teach you basic steps on how to become a security-first organization How to take a holistic approach to online security The most effective way to keep your organization safe from a data breach

  • 1Password
  • Cybersecurity
  • Risk Management/Security
  • Details

9 principles for a better company password policy

by 1PasswordDec 06, 2021

What's the ideal password policy?
Should you be emphasizing password length or complexity?

This guide will help you determine a policy that's strong enough to protect your business and thwart potential hackers, but not so complicated that employees will ignore it.

You'll learn: Why numbers and symbols should be optional The importance of passphrases How a password manager can help make your policy a success How to separate what's important from corporate

  • 1Password
  • Cybersecurity
  • Risk Management/Security
  • Details

The guide to creating a culture of security

by 1PasswordDec 06, 2021

For today's business, security is a teamwide effort and should involve everyone at your organization, not just IT. All it takes is one slightly out-of-date computer or a reused password for a cyber criminal to gain access to your company's most sensitive data. Is your security risk management handled only by IT? Or, does proper security protocol permeate throughout your organization?

Download this guide to learn: How mindful habits can increase both productivity and security What your

  • 1Password
  • Cybersecurity
  • Risk Management/Security
  • Details

A beginner’s guide to cybersecurity: 15 tips to protect your data and stay safe online

by 1PasswordDec 06, 2021

It doesn't take much to protect yourself from the vast majority of cybersecurity attacks. This guide breaks down the steps that anyone can follow to improve their digital defenses — both at home and in the office.

Download now to learn why it's important to: Keep your devices up to date Use 2FA everywhere it's offered Switch to a secure messaging app Understand what phishing is and how to avoid it

  • 1Password
  • Cybersecurity
  • Risk Management/Security
  • Details

Extended Detection and Response (XDR) For Dummies

by CiscoDec 03, 2021

With so many definitions and acronyms related to threat detection, it's important to fully understand what each term means and then determine if that type of solution is robust enough to offer the level of security your organization needs.

It's easy to be overwhelmed by the complexity — but we're here to help!

The Extended Detection and Response (XDR) For Dummies eBook explores the various types of threat detection and provides considerations for using a comprehensive

  • Cybersecurity
  • Cloud Security
  • Security Monitoring
  • Details

Optimizing Your Network

by Park PlaceDec 02, 2021

Today, we're counting on our corporate networks more than ever. Complex applications, remote access, and demands for edge computing continue to grow exponentially in these difficult times. Network monitoring and troubleshooting have no plans of going away. In this webinar, we'll be covering the state of network optimization and tools and techniques for troubleshooting.


Analytics Workloads for the New Era of AI Applications

by DellDec 01, 2021

Data is fundamental to creating efficient business operations, discovering new revenue opportunities, and delivering exceptional customer experience. As the world continues to become increasingly technology-centric, with an ever-growing number of data sources and streams, enterprises are facing the challenge of making sense of the staggering volume and diversity of data using traditional data processing application software. One of the most effective and proven way of dealing with such large and


Beyond Voice & Messaging – Innovate Customer Experiences with Programmable Digital Engagement

by RadiSys CorporationDec 01, 2021

Today's digitally powered economy is set to take off. By leveraging the high-bandwidth, low-latency network services, operators use APIs to expose their network services, allowing a vast community of new mobile and web application developers to create new experiences without telephony communications infrastructure expertise. With the rapid advances in fixed and wireless networks, such as 5G, service providers are in a position to leverage this new programmable communications paradigm to


What Elite Threat Hunters See that Others Miss

by Team CymruNov 29, 2021

We spoke with a multinational corporation with several business units that employs threat reconnaissance to improve security. This walkthrough will illustrate the value of employing analysts in more strategic ways to optimize the incident response process, as well as improve prevention and detection.

Many cyber security veterans may not recognize threat reconnaissance as an option for them, as the activity conjures thoughts of intelligence agencies and military. For many,

  • Team Cymru
  • Cybersecurity
  • Risk Management/Security
  • Security platforms
  • Details

Forrester Total Economic Impact Report Infographic

by Team CymruNov 29, 2021

Total Economic Impact™ of Pure Signal™ Recon Infographic

How to Achieve Tangible Financial Gains and a Proactive Security Posture

Team Cymru commissioned Forrester Consulting to quantify the positive financial impact of external threat hunting using Team Cymru's Pure Signal™ Recon solution. Supply chain risk is top of mind for most organizations. The company in this study applied external threat hunting to this challenge and is now able to tell third-party

  • Team Cymru
  • Cybersecurity
  • Risk Management/Security
  • Security platforms
  • Details