Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Automated Vulnerability Remediation Solution Brief

by AutomoxFeb 02, 2023

Fixing vulnerabilities doesn't have to be a fire drill. Threat exposure is a growing business risk - with vulnerabilities piling up faster than traditional remediation processes and tools can fix them.

Learn more about the fastest path to full-cycle vulnerability management and get full-cycle vulnerability detection and remediation in minutes, not months.

  • Automox
  • Endpoint Security
  • Risk Management/Security
  • IT Strategy
  • Details

Navigating the Path to Enhanced Authentication

by AxiadFeb 01, 2023

Conventional wisdom now suggests that fine tuning authentication is an important step in protecting your organization. On the surface, this sounds simple. Yet, the reality is much more complex with a myriad of systems and methodologies. How do you decide what steps to take next?

Download the "Navigating The Path to Enhanced Authentication" infographic to:

Learn more about the various authentication options available Weigh the pros and cons of your current

  • Axiad
  • Cybersecurity
  • Endpoint Security
  • Details

A Passwordless Future Begins with Credential Management

by AxiadFeb 01, 2023

Passwords are a major security flaw, yet still remain a staple of most enterprises. KuppingerCole Analysts provide insight on going passwordless for your Zero Trust initiatives.

Read "A Passwordless Future Begins with Credential Management" for insight on: Improving your organization's security posture with a Zero Trust approach Initiating passwordless to support the Zero Trust's "never trust, always verify" philosophy Gaining efficiencies through credential

  • Axiad
  • Cybersecurity
  • Endpoint Security
  • Details

The 2022 Authentication Survey Results Revealed

by AxiadFeb 01, 2023

Cybersecurity leaders must address high levels of complexity regarding authentication and identity security - in fact, 70% say they are overwhelmed by their authentication practices. A survey conducted by Censuswide explore why, as how to get ahead of the challenge. Download "The 2022 Authentication Survey Results" to learn: Why organizations struggle with authentication What are the biggest challenges to overcome How your peers are managing authentication

  • Axiad
  • Cybersecurity
  • Endpoint Security
  • Details

Rethinking Enterprise Authenticaton, A Better Way to Handle

by AxiadFeb 01, 2023

Authentication tends to be a complex, cumbersome workload in the enterprise. Using multiple solutions creates risk, inefficient administration, and end-user frustration. Read this paper to hear from your peers and real users of Axiad's technology that discuss: Balancing protecting the organization and reducing friction Switching to integrated, holistic solutions for authentication Improving security while reducing costs

  • Axiad
  • Cybersecurity
  • Endpoint Security
  • Details

The Rise of Zero Trust Authentication

by Beyond IdentityFeb 01, 2023

There is widespread recognition that our primary methods for authenticating users - passwords, augmented with some flavor of weak multi-factor authentication (MFA) - are wholly inadequate. That's why the move to secure authentication is critical right now as organizations move to a zero trust security model. Download this whitepaper to learn: How zero trust is the cybersecurity community's leading response to security challenges Why phishing-resistant,

  • Beyond Identity
  • Cybersecurity
  • Endpoint Security
  • Cloud Security
  • Details

The Definitive Zero Trust Authentication Checklist

by Beyond IdentityFeb 01, 2023

While many organizations have chosen to upgrade their endpoint detection and response tools and move from virtual private networks (VPNs) to Zero Trust Network Access (ZTNA) solutions, many are also looking to ensure the users-the identity of the users and the device(s) they are allowed to use-are valid and secure. Marrying identity-centric access to network-centric access is the essence of zero trust and authentication plays a critical role. Download

  • Beyond Identity
  • Cybersecurity
  • Endpoint Security
  • Cloud Security
  • Details

Passwordless Authentication: What It Is and How It Works

by Beyond IdentityFeb 01, 2023

Over the years, a number of password alternatives have been developed. We've seen Common Access Cards (CAC), smartcards, and biometrics-just to name a few. However, passwords continue to be used as a backup for these methods. As long as a password is used, you remain vulnerable to password-based threats like phishing attacks, SIM swaps, and more. That's why the move to passwordless authentication continues to grow in popularity. Download this guide to learn: How

  • Beyond Identity
  • Cybersecurity
  • Endpoint Security
  • Cloud Security
  • Details

US Government on Phishing-Resistant MFA

by Beyond IdentityFeb 01, 2023

On January 26, 2022, the Office of the Management and Budget (OMB) issued a memo with the subject "Moving the U.S. Government Towards Zero Trust Cybersecurity Principles." This memo sets the groundwork for creating a zero trust architecture for federal agencies, with the goal of meeting this objective by the end of 2024. Download this brief to: Discover key takeaways from the government memo Learn why phishable factors need to be eliminated Understand why the US

  • Beyond Identity
  • Cybersecurity
  • Endpoint Security
  • Cloud Security
  • Details

CISO Guide to Business Email Compromise

by Abnormal SecurityJan 31, 2023

Business email compromise costs organizations $2.4 billion per year.

These scams are the largest cybersecurity threat, accounting for nearly 35% of all losses due to cybercrime. Discover how these attacks trick your employees into sending money and valuable information, and what you can do to stop them.

Download this white paper, created by Dr. Eric Cole at Secure Anchor, to: Learn what BEC is and which types cybercriminals use to attack Discover why BEC attacks slip

  • Cybersecurity
  • Cloud Security
  • Abnormal Security
  • Details