Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

What Elite Threat Hunters See that Others Miss

by Team CymruNov 29, 2021

We spoke with a multinational corporation with several business units that employs threat reconnaissance to improve security. This walkthrough will illustrate the value of employing analysts in more strategic ways to optimize the incident response process, as well as improve prevention and detection.

Many cyber security veterans may not recognize threat reconnaissance as an option for them, as the activity conjures thoughts of intelligence agencies and military. For many,

  • Team Cymru
  • Cybersecurity
  • Risk Management/Security
  • Security platforms
  • Details

Forrester Total Economic Impact Report Infographic

by Team CymruNov 29, 2021

Total Economic Impact™ of Pure Signal™ Recon Infographic

How to Achieve Tangible Financial Gains and a Proactive Security Posture

Team Cymru commissioned Forrester Consulting to quantify the positive financial impact of external threat hunting using Team Cymru's Pure Signal™ Recon solution. Supply chain risk is top of mind for most organizations. The company in this study applied external threat hunting to this challenge and is now able to tell third-party

  • Team Cymru
  • Cybersecurity
  • Risk Management/Security
  • Security platforms
  • Details

The State of Threat Hunting and the Role of the Analyst

by Team CymruNov 29, 2021

Over 1,700 IT and IT security professionals across North America, Latin America, the UK and Europe responded to a Ponemon Institute study, commissioned by Team Cymru.

The results indicate that practitioners are working towards building more mature analyst teams and threat hunting capabilities, yet leadership lacks a firm understanding of the role these components should play in the overall security strategy.

The study tracks the level of importance placed on security

  • Team Cymru
  • Cybersecurity
  • Risk Management/Security
  • Security platforms
  • Details

The Five Phases of AWS Cloud Security Strategy

by Guidepoint SecurityNov 29, 2021

As multi-cloud becomes more of a common deployment pattern, organizations need an approach that is both tactical and strategic at the same time. In this paper, you'll learn how to: Build a strong, firm foundation Establish a new perimeter strategy Address your cloud solutions

  • Guidepoint Security
  • Cybersecurity
  • Cloud Security
  • Cloud Services
  • Details

Secure Your Remote Workforce in the AWS Cloud

by Guidepoint SecurityNov 29, 2021

How are organizations maintaining security when a growing number of companies are allowing users to access company data from cell phones, personal laptops and dynamic locations? Find out in this paper where you'll learn about: Deploying a zero trust application The new cloud culture Amazon Workspaces

  • Guidepoint Security
  • Cybersecurity
  • Network & Perimeter Security
  • Cloud Services
  • Details

Reckoning with Ransomware

by Guidepoint SecurityNov 29, 2021

There are a myriad of intricate events and considerations that occur over the life of an incident and during the incident response process. This paper will walk through the timeline of a hypothetical ransomware incident and examine the steps to handle similar situations. What steps your organization's ransomware response should include Who needs to be included in your organization's ransomware response communications What the recovery process can look like when a solid plan is

  • Guidepoint Security
  • Cybersecurity
  • Security
  • Details

Implementing XDR to Modernize Enterprise Security

by Dark ReadingNov 29, 2021

Extended detection and response (XDR) promises to provide visibility across an organization's endpoints, network, and cloud workloads. XDR could be the answer to many enterprise security teams' prayers, except that the SIEM market had made similar promises and fallen short on delivering them. For XDR to succeed on a wide scale, enterprises need to understand and plan for the implementation challenges. This report highlights the considerations and strategies that contribute to XDR success.

  • Dark Reading
  • Cloud Services
  • Software as a Service
  • Endpoint Security
  • Platform as a Service
  • Network & Perimeter Security
  • Security Management & Analytics
  • Details

Threat Detection and Response

by CBTSNov 24, 2021

Few organizations have the expertise or infrastructure to effectively protect their data. Stay one step ahead of cyber criminals with Managed Threat Detection and Response. Visibility provides knowledge!

Read the Managed Threat Detection and Response to help your organization with:
• Alert fatigue
• Network monitoring
• Investigation and verification
• Threat awareness
• Incident Response

  • CBTS
  • Cybersecurity
  • Endpoint Security
  • Network & Perimeter Security
  • Cloud Infrastructure
  • Details

CISO's Survival Guide: Five tips to make your operations more efficient

by CBTSNov 24, 2021

Juggling security and business risks is a challenge when you're facing talent shortage, evolving threats, and a sprawling vendor landscape.

How can you go from overwhelmed to empowered? Download this survival guide to find out!

  • CBTS
  • Risk Management/Security
  • Security
  • Details

Case Study: Credit Union undergoes IT transformation

by CBTSNov 24, 2021

With face-to-face services becoming less desirable, this credit union was driven to find innovative security solutions to connect to and grow its customer base. By offloading day-to-day infrastructure, security, hardware, and software, the credit union has overcome IT challenges and is laser-focused on the future.

In business since 1935, this credit union overcame IT challenges and is now laser-focused on future growth, proving that organizations who invest in technology take the lead!

  • CBTS
  • Infrastructure
  • Network and Systems Management
  • Details