Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Report: Building and Maintaining an Effective Remote Access Strategy

by Dark ReadingAug 08, 2022

While organizations have been supporting work-from-home employees long before the COVID-19 pandemic lockdowns, the abrupt shift to everyone working from home still stressed enterprise architectures. Security teams deployed new controls and relaxed some policies so that people could keep working. As enterprises modernize their security architecture to accommodate the permanently remote employees, they are exploring zero trust, secure access service edge, new BYOD policies, and endpoint controls.

  • Dark Reading
  • Cybersecurity
  • Network & Perimeter Security
  • Cloud Infrastructure
  • Details

Modernizing Secure Remote Access Through Zero Trust

by Menlo SecurityAug 08, 2022

This white paper by the Enterprise Strategy Group explores why organizations are turning to ZTNA, how ZTNA fits into an organization's broader security strategy, and key factors to consider in a ZTNA solution.

Key insights include: Why VPNs alone can't handle modern access needs. Deployment considerations for ZTNA planning. Why not all ZTNAs are created equal when it comes to implementing Zero Trust.

  • Menlo Security
  • Network & Perimeter Security
  • Cybersecurity
  • Details

How Hybrid Work Fuels Ransomware Attacks

by Menlo SecurityAug 08, 2022

Learn how today's hybrid workforce has opened the door for ransomware attacks, but most importantly, what organizations can do to shut it. Key insights include: Why hybrid work directly fuels the most common attack vectors for ransomware. How endpoint protection is lacking despite threat actors' increased focus on the browser. What organizations are doing about key ransom demands.

  • Menlo Security
  • Cybersecurity
  • Security platforms
  • Details

Top Cloud Threats to Cloud Computing: Pandemic Eleven

by ExtraHopAug 03, 2022

The Top Threats reports have traditionally aimed to raise awareness of threats, risks, and vulnerabilities in the cloud. Such issues are often the result of the shared, on-demand nature of cloud computing.

Learn from a survey of over 700 industry experts on security issues in the cloud industry. This year our respondents identified eleven salient threats, risks, and vulnerabilities in their cloud environments.

Read this report to gain a better understanding of how the Top

  • ExtraHop
  • Risk Management/Security
  • Cybersecurity
  • Details

SANS 2022 Cloud Security Survey

by ExtraHopAug 03, 2022

Over the past several years, we have seen more examples of vulnerabilities in cloud assets, cloud service provider outages, sensitive data disclosure, and breaches involving the use of public cloud environments.

In this recent survey, several hundred respondents—from a variety of industries—provide additional insight into how organizations are using the cloud today, the threats security teams face in the cloud, and what they are doing to improve their security posture.

  • ExtraHop
  • Cloud Security
  • Cybersecurity
  • Details

Reveal(x) 360 Cloud Threat Defense for AWS

by ExtraHopAug 03, 2022

Cloud environments are notorious for visibility gaps that weaken security. Unmanaged workloads, server less environments, and containers that only exist for minutes all contribute to visibility challenges.

Learn how ExtraHop Reveal(x) 360 now offers continuous visibility in AWS-based VPC Flow Logs. Organizations can choose flow logs as a standalone subscription or combine that cloud-native data source with packets to take a multi-layered approach to cloud threat defense.

  • ExtraHop
  • Cloud Security
  • Cybersecurity
  • Details

Building and Maintaining an Effective Remote Access Strategy

by Menlo SecurityAug 02, 2022

The COVID-19 pandemic transformed enterprises into remote workplaces overnight, forcing IT organizations to revamp their computing and networking strategies on the fly. Some of the changes were intended to be temporary, and some rules were adopted without thinking through all the implications. With businesses moving to permanent work-from-home and hybrid work models, enterprise IT teams need to rebuild their security strategies and switch off temporary rules and controls. In this webinar,


The Failed Promises of SIEM

by MixModeAug 01, 2022

While security information and event management (SIEM) vendors continue to insist their technology is sufficient to meet the dynamic challenges and exceptionally complex threatscape faced by cybersecurity teams today, their behavior in the marketplace and overall performance tells a different story.

Read "Failed Promises of SIEM" to Learn: The evolution of SIEM in the cyber industry Why Many SIEM Vendors Have Failed to Meet their Promises How to Improve on the Typical SIEM

  • MixMode
  • Security Management & Analytics
  • Network & Perimeter Security
  • Details

Is "One-Click-Remediation" Intentionally Misleading SOC Teams

by MixModeAug 01, 2022

Advanced Cyber Threat Detection platforms providing automated attack protection are thriving, while legacy, data dependent cyber tools continue to struggle. To counteract the ever-increasing lack of customer confidence, legacy tool vendors are making increasingly bold and inaccurate claims to boost revenues. Most recently, one-click, automated remediation has emerged as a popular "click-bait" headline. In this Whitepaper we'll discuss why these claims can be intentionally misleading and in some

  • MixMode
  • Network & Perimeter Security
  • Endpoint Security
  • Details

Self-Learning Cyber Defense for Financial Services - Intelligence Achieved

by MixModeAug 01, 2022

The country's largest Financial Services companies are a favorite target for nation-state sponsored and coordinated cyber-attacks to cause economic damage and disruption. Despite a significantly larger investment in cybersecurity than almost any other industry, breaches and successful novel attacks against these organizations still remain a daily occurrence.

Learn how one of the Largest Financial Services Institutions in the US: Deployed a Next-Gen Threat Detection Platform to

  • MixMode
  • Risk Management
  • Cloud Security
  • Details