Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Most Risk-Based Vulnerability Management Programs are Ineffective

by Vulcan CyberJan 11, 2022

Eighty-six percent of enterprise IT and security executives surveyed rely on third-party vulnerability severity data to prioritize vulnerabilities with an additional 70% relying on third-party threat intelligence. This underscores a concerning trend identified in a majority of cyber security organizations today, with a majority relying heavily on measures and data from external sources that lack the necessary context to effectively inform and prioritize cyber risk specific to their business unit

  • Vulcan Cyber
  • Cybersecurity
  • Risk Management/Security
  • Details

The Best Free and Open Source Tools for Cyber Risk Assessment and Mitigation

by Vulcan CyberJan 11, 2022

The number of newly disclosed vulnerabilities has been growing for more than a decade and the emergence of cloud-native infrastructure has only escalated the pace. With so many new vulnerabilities to fix, dozens of free and open-source tools are available to help assess and mitigate cyber risk. This white paper outlines the most-useful free and open-source tools to help IT security teams get started with effective cyber risk measurement, management and mitigation.

  • Vulcan Cyber
  • Cybersecurity
  • Risk Management/Security
  • Details

A Step-by-Step Guide to Achieve Vulnerability Management Maturity

by Vulcan CyberJan 11, 2022

Read the eBook to understand the four stages of vulnerability remediation maturity: Reactive; Data-driven; Orchestrated; Transformative. Learn the behaviors and benefits of each stage starting with risk-based vulnerability aggregation and prioritization. Then discover how your organization can move from "Reactive" to "Transformative" with the Vulcan Cyber vulnerability remediation maturity model eBook and more effectively mitigate cyber risk and protect your business from security threats.

  • Vulcan Cyber
  • Cybersecurity
  • Security
  • Details

What is Observability?

by CriblJan 10, 2022

Over the last two years, the increasing complexity of modern distributed systems and application architectures has highlighted the limits of legacy monitoring approaches. Legacy monitoring remains fixated on collecting and reporting errors, restricting its effectiveness in today's dynamic and ephemeral environments. Observability takes a new approach, allowing teams to interrogate system behavior without the limits imposed by legacy methods and products. Download this whitepaper to get the

  • Cribl
  • Cybersecurity
  • Security
  • Details

Gartner's Cool Vendors in Monitoring and Observability Report

by CriblJan 10, 2022

Observability continues to increase in importance as a key mechanism to understand modern architectures and applications. Legacy monitoring solutions may not innovate with sufficient speed, so I&O leaders should look to these cool vendors to close their visibility gaps. Download Gartner's New Report: Cool Vendors in Monitoring and Observability — Modernize Legacy, Prepare for Tomorrow.

  • Cribl
  • Cybersecurity
  • Security Monitoring
  • Details

Shutterfly Leverages Cribl LogStream to Streamline Their Data Experience

by CriblJan 10, 2022

The Shutterfly data operations team supports the production of a myriad of printed and digital goods across multiple product groups. This requires that they capture and process an extremely high volume of data from diverse sources, then route that data to a similarly diverse set of destinations. The team uses Cribl LogStream to address the complexity and intensity of this work, allowing them to deliver a flexible and resilient service to their internal and external customers. In this case

  • Cribl
  • Cybersecurity
  • Security
  • Details

Improving Splunk Performance and Lowering CPU Usage with Cribl Logstream

by CriblJan 10, 2022

This white paper will cover why you should adopt a new method for Splunk searches and how you can use Cribl's LogStream to improve Splunk performance and lower CPU usage. We'll focus on Splunk as the destination, but regardless of destination, transforming the data first helps reduce infrastructure costs and storage costs, enabling you to do more with your software license. By improving Splunk performance for search and lowering CPU usage you can: Ingest even more data, without stretching

  • Cribl
  • Cybersecurity
  • Security
  • Details

Cloud Security Strategies for Today’s Enterprises

by ZscalerJan 06, 2022

The typical enterprise relies on dozens, even hundreds, of cloud applications and services sprawled across different platforms and service providers. Security teams need to shoulder the responsibility of coordinating security and incident response and not leave it up to individual providers. In this webinar, experts discuss the specific tools and best practices to manage security in the cloud environment. You?ll learn technologies and strategies to safely move data into the cloud, enforce


Key Findings: ESG Endpoint Security Megatrends

by CybereasonJan 01, 2022

As security threats continue to evolve, our approaches to security must evolve as well. Legacy signature-based antivirus solutions are no longer enough to prevent the highly targeted attacks of today, making traditional solutions an inadequate defense. The ongoing shift to XDR and the rise of MXDR services for prevention that leverages machine learning for behavioral detections early in the attack progression.

Read 'The ESG Endpoint Security Megatrends' Report to Learn: How

  • Cybersecurity
  • Cloud Security
  • cybereason
  • Details

Gartner XDR Market Guide

by CybereasonJan 01, 2022

The endpoint security landscape continues to evolve with buyers pursuing a vendor and agent consolidation strategy and moving away from best-of-breed solutions. Vendors are leveraging buyer sentiment by expanding portfolios and bundling offerings, while adding new offerings in EDR, XDR and MDR.

Read 'The Gartner XDR Market Guide' for Key Findings: Cloud-native endpoint protection platform (EPP) solutions continue to witness an uptick in adoption as they shift the administration

  • cybereason
  • Cybersecurity
  • Cloud Security
  • Details