Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Building an Effective Active Directory Security Strategy

by Attivo NetworksMay 19, 2022

For cyber criminals, Microsoft?s Active Directory is a treasure trove of user identity and system access. But while Active Directory is a potential attack vector, it can also play a crucial role in enterprise cyber defenses. In this webinar, experts will describe tools, processes, and strategies for improving user and system security, and for integrating AD into an effective security architecture. You?ll also learn about the latest attacks and threats posed to AD, and how you can mitigate

  • Identity and Access Management
  • Details

Elevating App Visibility to Prevent Future Headaches

by SALT SecurityMay 19, 2022

Increasingly complex applications tend to create blind spots that cause pain for IT teams when they least expect it. If attackers exploit a critical flaw in an application that you didn?t even know that your organization was using, it might be a very bad day for you. If your network traffic is clogged up because of a bottleneck you can?t locate, that?s a frustrating problem to solve. However, with the right processes and tools in place, IT teams can get a clearer picture of their


Automating IT Service Management: Where to Start

by TeamDynamixMay 18, 2022

Many IT service desks are spinning their wheels trying to manage procedural and repetitive ITSM tasks like user management, onboarding, and name updates. According to a recent study from Information Week, sponsored by Team Dynamix, only 10% of organizations say they?re able to leverage an integration and workflow platform to handle these tasks automatically. Why is it so difficult and how can organizations finally get their automation efforts off the ground? Find out why and how this can be


Report: ICS/OT Cybersecurity 2021 Year in Review

by DragosMay 18, 2022

Dragos is excited to present the fifth year of the annual Dragos Year In Review report on Industrial Control System (ICS)/ Operational Technology (OT) cyber threats, vulnerabilities, assessments, and incident response observations.

The ICS/ OT community has long suffered from more anecdotes on security than insights driven from data and real-world cases given the sensitivity of the subject. A lack of insights into the ICS/OT threat landscape and state of security prevent the community

  • Dragos
  • Cybersecurity
  • Security Management & Analytics
  • Risk Management/Security
  • Details

Executive Summary: ICS/OT Cybersecurity 2021 Year in Review

by DragosMay 18, 2022

In 2021, the industrial community attracted high-profile attention. Major cybersecurity incidents struck industrial organizations in a range of sectors, with international headlines detailing everything from a compromise of a water treatment facility with intent to poison its community to a ransomware attack against a pipeline operator that disrupted gas supplies to the southeast United States.

These reports underscored the potential devastating outcomes a security breach of critical

  • Dragos
  • Cybersecurity
  • Network and Systems Management
  • Risk Management/Security
  • Details

Report: An Executive's Guide to Industrial Cybersecurity

by DragosMay 18, 2022

As enterprises invest heavily in digital transformation, industrial cybersecurity will increasingly serve as a critical enabler for safely and securely advancing business goals through technological innovation.

Advancing connectivity and digitalization of operational technology (OT) provides significant benefits to the business, including: Increased automation Improved process efficiency Better asset utilization Enhanced telemetry of machinery for business forecasting

  • Dragos
  • Cybersecurity
  • Unified Communications
  • Risk Management/Security
  • Details

Whitepaper: PIPEDREAM: Chernovite’s Emerging Malware Targeting Industrial Control Systems

by DragosMay 18, 2022

Threats to industrial infrastructure security are an extremely sensitive matter. Given the unique realities of industrial operations it is often harder for defenders to react than for adversaries to leverage public information. The more time the community has to implement mitigations before new malicious capabilities become public, the better the effects of any attempted attacks can be reduced.

PIPEDREAM is the seventh known Industrial Control Systems (ICS)-specific malware and fifth

  • Dragos
  • Cybersecurity
  • Cloud Security
  • Network and Systems Management
  • Details

Whitepaper: How Dragos Activity Groups Obtain Initial Access into Industrial Environments

by DragosMay 18, 2022

As the threat landscape continues to evolve with a perpetual influx of new network anomalies and Indicators of Compromise (IOC), prudent defenders must focus on more actionable elements of attack characteristics, such as Tactics, Techniques and Procedures (TTPs). One such example of this is the Initial Access Tactic.

Initial access is one of the most important adversarial tactics and may form the critical dependency on which further tactics rely, or conversely it may be the end goal

  • Dragos
  • Cybersecurity
  • Cloud Security
  • Network and Systems Management
  • Details

Building and Maintaining an Effective IoT Cybersecurity Strategy

by MicrosoftMay 17, 2022

The Internet of Things (IoT) is much bigger than appliances in business contexts, as tools and non-computer devices are increasingly connected to the Internet. And attackers are taking advantage of these Internet-enabled technologies to target corporate data and systems. How can an enterprise IT department develop and manage an effective security strategy for IoT technology? In this webcast, experts discuss the most effective approaches to securing the embedded systems and industrial systems


Digital Innovation: Opportunities, Risks, and Responsibilities

by Micro FocusMay 17, 2022

Strategic IT investments can bring all manner of business innovations to life. Digital transformation can lead to better patient outcomes, higher ecommerce sales, greater research discoveries and more. However, it also comes with risks. With new technology and more data collection come new cybersecurity vulnerabilities and privacy concerns. With more analytics and powerful computing come bigger environmental impacts. With greater use of AI come new ethical questions. And while businesses race to