Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Beyond Passwords: New Thinking and Strategies for Authentication

by Yubico Inc.Jan 27, 2022

The debate about the usefulness of passwords rages on. But most security experts agree that data protection is not adequate with simple password protection. Which tools and strategies for authentication should you consider today to up-level your authentication strategy? How can you move beyond the password and implement next generation authentication technology? In this webinar, experts offer a broad look at your options for multifactor authentication, the challenges and pitfalls of these


Bringing Zero Trust to Cloud Native Applications

by Palo Alto Networks, Inc.Jan 27, 2022

Cloud transformations bring endless possibilities to enterprises. They enable developer teams to modernize their applications with cloud-native development and allow security teams to strengthen defenses with a Zero Trust framework. Zero Trust is a strategic cybersecurity initiative that major organizations align to in order to prevent successful cyberattacks. However, rapid cloud scale without security embedded across the entire development pipeline becomes a toxic combination. Join this


The D.A.R.T. Strategy for API Security

by Noname SecurityJan 27, 2022

Today, businesses rely on APIs more than ever before. Gartner estimates that API calls represent 83% of all web traffic. Given the increased reliance on APIs, their importance to digital businesses, and the rising level of sophistication of hackers looking to compromise those APIs, organizations need a proven strategy for API security.

We call this strategy D.A.R.T.: Discover: detect all APIs across the network, including rogue and shadow APIs Analyze: understand API

  • Noname Security
  • Cybersecurity
  • Risk Management/Security
  • Security Management & Analytics
  • Details

Hacking Banks and Cryptocurrency Exchanges Through Their APIs

by Noname SecurityJan 27, 2022

Research by Alissa Knight, former hacker, current CISO and researcher

APIs are the plumbing of today's financial services and FinTech infrastructure, enabling FinTechs to embed banking into their apps and banks to offer a more unified experience to their customers demanding more from their bank.

However, these APIs are vulnerable to API hacking and attacks, creating an attack surface that is pervasive across our national financial system.

This API security

  • Noname Security
  • Risk Management/Security
  • Payments
  • Business Intelligence
  • Details

Work From Anywhere Doesn’t Have To Be Complicated

by FortinetJan 27, 2022

Over the past decade or so, technology has been steadily evolving to give workers more flexibility in the devices they use, the locations they can work from, and the resources they can access.

Read the solution brief to learn: How to secure a hybrid workforce Provide Consistent Security No Matter Where Users Are Located The three most common scenarios which require protection The key benefits of using a platform with threat intelligence

  • Fortinet
  • Cybersecurity
  • Security
  • Details

The State of Zero Trust Report

by FortinetJan 27, 2022

Most organizations claim to either have a zero-trust access (ZTA) or ZTNA strategy either in place or in active deployment. However, most also report that they cannot consistently authenticate users or devices and struggle to monitor users after authentication.

Read the solution brief to learn: How well zero trust and ZTNA are understood The perceived benefits and challenges in implementing a zero-trust strategy Adoption of and the elements included in a zero-trust strategy

  • Fortinet
  • Cybersecurity
  • Security
  • Details

Fortinet Special Edition: Zero Trust Access for Dummies

by FortinetJan 27, 2022

As businesses continue to embrace digital innovation, cloud applications, and the new work-from-anywhere normal, enterprise networks have become far more complicated and dispersed with an ever-growing number of edges.

Read the ebook to learn: How to reduce the attack surface Securing the new hybrid workforce Improving application access and security

  • Fortinet
  • Cybersecurity
  • Security
  • Details

Improve Application Access and Security With Fortinet Zero Trust

by FortinetJan 27, 2022

The massive shift from working in an office to working at home has highlighted many security and connectivity challenges. In addition, today's networks are highly distributed with resources spread across data centers and multiple clouds.

Read the ebook to learn: How to build a Zero Trust Network Access system How to simplify secure connectivity How to reduce the attack surface

  • Fortinet
  • Cybersecurity
  • Security
  • Details

API Security 101 Whitepaper

by Noname SecurityJan 27, 2022

APIs are everywhere in the modern IT world, and the volume of API traffic is only expected to grow. However, despite the power and popularity of APIs, many organizations struggle with API security. When it comes to securing APIs, traditional application security controls are not a complete solution.

In this API security white paper, we will cover: APIs as a widely adopted integration tool Two elements needed to deliver APIs API security challenges (even those different than

  • Noname Security
  • Cybersecurity
  • Risk Management/Security
  • Security Management & Analytics
  • Details

Leading Financial Institutions

by Team CymruJan 26, 2022

Large financial services companies are prime targets for a broad variety of threat actors, including the most persistent nation-state sponsored outfits. From closing gaps in visibility to achieving a more proactive security posture, the following whitepaper illustrates how any organization can benefit from the access to Pure Signal™.

Download this white paper to learn about: Preemptive mapping of APTs and preventing incident recurrence; Building a complete picture out

  • Team Cymru
  • Cybersecurity
  • Risk Management/Security
  • Details