Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Vendors as Your Largest BEC Threat

by Abnormal SecurityJun 22, 2022

The tactics that worked for your business five years ago likely aren?t still working today, and cybercrime is no different. The CEO fraud that dominated the last few years is not nearly as successful as it used to be, partially because employees understand that their CEO isn?t emailing them about gift cards at 2:00 in the morning. Not to be outdone, cybercriminals have shifted their tactics, now relying more on vendor impersonation and vendor email compromise to run their scams. The average


To Pay or Not to Pay? Solving for the Ransomware Risk Equation

by RubrikJun 22, 2022

You don?t want to pay a ransomware attacker. You can?t afford to pay a ransom, but can you afford NOT to pay it? CIOs ask themselves this question every day, and they rarely know the answer. Precious time is wasted while they try to determine the extent of the damage, the value of the data/assets impacted, the quality of backup systems, the opportunity costs of downtime, and more. In this webinar, you'll learn what topics IT executives need to study up on now, so they?re ready to tackle


Work smarter, not harder: How to configure telephony for Microsoft Teams, Genesys and more

by BandwidthJun 22, 2022

Getting individual UC or contact center platforms to the cloud is step one?but once you?re there, how can you get the greatest value out of your investments? As an IT leader, you need to consider your entire cloud communications ecosystem, not just siloed solutions. The way you configure each individual application and platform has a domino effect on your entire comms stack. Find out how the Fortune 500 are managing their entire comms stacks, getting the most out of each migration, and

  • IP Telephony and Unified Communications
  • Details

Implementing Zero Trust in Your Enterprise

by DelineaJun 21, 2022

Attackers have shown time and again that perimeter security is no longer enough to keep them out. The concept of internal users and outsiders doesn?t work in network defense when attackers use credential theft and lateral movement to pretend they are legitimate internal users. The zero-trust model ? trust nothing, verify everything ? sounds straightforward, but it can be a challenge to deploy. In this webinar, learn from the experts what zero-trust looks like in practice, how to create a

  • Network & Perimeter Security
  • Details

Using Compliance Budget to Advance Security Priorities

by Sumo LogicJun 20, 2022

Enterprise Management Associates (EMA) report Using compliance budget to advance security priorities (May 2022) addresses the need to remove the silos between compliance and security. 58% say it's very important that tools used to address DATA PRIVACY are also used to address SECURITY CONCERNS 67% say data privacy regulations like GDPR, CCPA, or CHANGING DATA CONTROLS are the biggest compliance challenges 40% of have suspended or postponed IT security projects to address compliance

  • Sumo Logic
  • Cybersecurity
  • Cloud Security
  • Details

UC Davis Accelerates Threat Response and Improves SOC Efficiency

by Sumo LogicJun 20, 2022

The UC Davis IT team needed a solution that would accelerate threat response and improve the efficiency of their SOC. Sumo Logic Cloud SOAR unified security operations and worked seamlessly with their carefully designed workflow to meet the university's unique security and operational requirements.

  • Sumo Logic
  • Cybersecurity
  • Cloud Security
  • Details

Top Challenges of Today's SOC

by Sumo LogicJun 20, 2022

In today's increasingly connected world, corporate security operations centers (SOCs) are more important than ever. SOC teams are on the front line of protecting the company operations and confidential data from the myriad of rapidly evolving cyber threats organizations face everyday. SOC teams are tasked with more responsibility than ever before.

As a result, they are drowning in systems that don't provide enough information or context to empower analysts to make informed decisions.

  • Sumo Logic
  • Cybersecurity
  • Cloud Security
  • Details

SOC Analysts are Working the Wrong Problem

by Sumo LogicJun 20, 2022

In today's increasingly connected world, corporate security operations centers (SOCs) are more important than ever against the ever-lurking data breach. Unfortunately, they are also working on the wrong problem because they lack the tools and visibility to do otherwise.

  • Sumo Logic
  • Cybersecurity
  • Cloud Security
  • Details

Implementing Zero Trust In Your Enterprise: How to Get Started

by Dark ReadingJun 20, 2022

Security leaders need to provide adaptive trust and conditional access based on identity, operational and threat context, and risk appetite. Translating the zero-trust vision to implemented reality requires MFA, centralized identity, software-defined security, and analytics, to name a few.

What's Inside: Navigating the zero-trust journey Explanation of the OMB zero-trust deadlines How zero-trust feeds into SASE Understanding modern privileged access management The

  • Dark Reading
  • Network & Perimeter Security
  • Endpoint Security
  • Networking
  • Details

Ransomware in Focus: New Research on CISO Perceptions, Perspectives, and Plans

by ZscalerJun 15, 2022

How are CISOs at leading organizations defending against the current onslaught of ransomware attacks? Three cybersecurity consultants interviewed over 250 CISOs, mostly in the United States, to gain their perspective on preventing, detecting, and responding to ransomware.

Topics covered include:
• How to decide whether to pay
• The financial impact of successful attacks
• Is ransomware insurance worth it?
• Attack stats by industry

  • Zscaler
  • Risk Management
  • Cloud Security
  • Risk Management/Security
  • Details