Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Why Legacy Point Tools Are Failing in Today's Environment

by TaniumAug 09, 2022

IT teams are in a tough spot these days. They're tasked with managing and securing millions of dynamic, diverse, and globally distributed endpoints located across cloud and hybrid networks. And, they must protect these endpoints from the growing wave of cybersecurity attacks. It's becoming clearer that using legacy point tools that were designed to work in small, static environments, and are failing in today's endpoint realities.

Discover the newest approach to endpoint security and

  • Tanium
  • Endpoint Security
  • Cybersecurity
  • Details

Lessons Learned: 5 Takeaways from Major Cybersecurity Headlines

by TaniumAug 09, 2022

The past two years have seen an unprecedented string of events that have elevated threat levels and increased awareness of cyber risks for every company in every industry.

This insightful guide examines recent notable cybersecurity incidents — some of which made headlines and caused significant damage to the victim organizations — and presents a strategy that any business should consider adopting to build a strong cybersecurity program designed to defend against

  • Tanium
  • Cybersecurity
  • Security
  • Details

Addressing Cyber Risk Starts with Understanding Cyber Risk

by TaniumAug 09, 2022

Cybersecurity efficacy has always been of chief importance but perhaps has never been as complicated as it is today. Chief information security officers (CISOs) struggle to explain the value and performance of security investments, which puts them in jeopardy of falling out of sync with business priorities or gives executives a false sense of confidence about security readiness.

This study from Harvard Business Review Analytic Services explores what measures can be taken to bridge

  • Tanium
  • Cybersecurity
  • Security
  • Details

Understanding the Zero Trust Approach

by TaniumAug 09, 2022

As cybersecurity practitioners know, the tiniest crack in a network's armor can be exploited. In fact, the castle-and-moat approach to cybersecurity is long past its "use by" date. The zero trust approach was made for these complicated and volatile times. Zero trust is a security methodology — not a product — that assumes no device or user can be trusted without verification.

This helpful guide acts as a user manual for how to successfully implement zero trust strategies

  • Tanium
  • Endpoint Security
  • Security
  • Details

Report: Building and Maintaining an Effective Remote Access Strategy

by Dark ReadingAug 08, 2022

While organizations have been supporting work-from-home employees long before the COVID-19 pandemic lockdowns, the abrupt shift to everyone working from home still stressed enterprise architectures. Security teams deployed new controls and relaxed some policies so that people could keep working. As enterprises modernize their security architecture to accommodate the permanently remote employees, they are exploring zero trust, secure access service edge, new BYOD policies, and endpoint controls.

  • Dark Reading
  • Cybersecurity
  • Network & Perimeter Security
  • Cloud Infrastructure
  • Details

Modernizing Secure Remote Access Through Zero Trust

by Menlo SecurityAug 08, 2022

This white paper by the Enterprise Strategy Group explores why organizations are turning to ZTNA, how ZTNA fits into an organization's broader security strategy, and key factors to consider in a ZTNA solution.

Key insights include: Why VPNs alone can't handle modern access needs. Deployment considerations for ZTNA planning. Why not all ZTNAs are created equal when it comes to implementing Zero Trust.

  • Menlo Security
  • Network & Perimeter Security
  • Cybersecurity
  • Details

How Hybrid Work Fuels Ransomware Attacks

by Menlo SecurityAug 08, 2022

Learn how today's hybrid workforce has opened the door for ransomware attacks, but most importantly, what organizations can do to shut it. Key insights include: Why hybrid work directly fuels the most common attack vectors for ransomware. How endpoint protection is lacking despite threat actors' increased focus on the browser. What organizations are doing about key ransom demands.

  • Menlo Security
  • Cybersecurity
  • Security platforms
  • Details

Top Cloud Threats to Cloud Computing: Pandemic Eleven

by ExtraHopAug 03, 2022

The Top Threats reports have traditionally aimed to raise awareness of threats, risks, and vulnerabilities in the cloud. Such issues are often the result of the shared, on-demand nature of cloud computing.

Learn from a survey of over 700 industry experts on security issues in the cloud industry. This year our respondents identified eleven salient threats, risks, and vulnerabilities in their cloud environments.

Read this report to gain a better understanding of how the Top

  • ExtraHop
  • Risk Management/Security
  • Cybersecurity
  • Details

SANS 2022 Cloud Security Survey

by ExtraHopAug 03, 2022

Over the past several years, we have seen more examples of vulnerabilities in cloud assets, cloud service provider outages, sensitive data disclosure, and breaches involving the use of public cloud environments.

In this recent survey, several hundred respondents—from a variety of industries—provide additional insight into how organizations are using the cloud today, the threats security teams face in the cloud, and what they are doing to improve their security posture.

  • ExtraHop
  • Cloud Security
  • Cybersecurity
  • Details

Reveal(x) 360 Cloud Threat Defense for AWS

by ExtraHopAug 03, 2022

Cloud environments are notorious for visibility gaps that weaken security. Unmanaged workloads, server less environments, and containers that only exist for minutes all contribute to visibility challenges.

Learn how ExtraHop Reveal(x) 360 now offers continuous visibility in AWS-based VPC Flow Logs. Organizations can choose flow logs as a standalone subscription or combine that cloud-native data source with packets to take a multi-layered approach to cloud threat defense.

  • ExtraHop
  • Cloud Security
  • Cybersecurity
  • Details