Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Cloud Security Posture Management

by CBTSNov 24, 2021

Cloud solutions have provided a wide range of benefits for organizations traditionally bound to the scale and reach of their data centers. Moving to the cloud flexibility and collaboration and eliminates capital spending on IT. However, migrating to the cloud can create vulnerabilities and expose security gaps in legacy applications if not handled properly.

Managed CSPM with automation helps organizations:
• Monitor Operations
• Classify and inventory assets

  • CBTS
  • Security
  • Cloud Security
  • Details

CIO Security Insight: Why your backup solution is crucial to defending your organization from ransomware

by CBTSNov 24, 2021

Whether your data is in the cloud or on-premises, having a solid data backup and restoration plan in place can protect against loss of data. Thise-bookfocuses on the current reality that many organizations face today, as well as why backup is an essential component of recovery from a ransomware incident.

Read the CIO Security Insight to:
• Diagnose and prepare for attacks
• Create a robust backup and recovery program

  • CBTS
  • Database Security
  • Security
  • Details

Managed DDoS Protection

by CBTSNov 24, 2021

DDoS attacks are on the rise thanks to the darknet enabling service tools to become a commodity. Also driving the increase in attacks are vulnerable IoT devices and financially motivated hackers.

Download the info sheet to learn how to protect revenue in businesses of any size.

  • CBTS
  • Network & Perimeter Security
  • Security
  • Details

The 3 pillars of Implementing a Zero Trust Network

by CBTSNov 23, 2021

Download the leadership research report and get a breakdown of the 3 pillars of zero trust

  • CBTS
  • Cybersecurity
  • Security
  • Details

Security Architecture Assessment

by CBTSNov 23, 2021

The security stack is not a one-size-fits-all. So how do you know if you have the right mix of security for your business? Are your processes and staff aligned with your tools? Where are your gaps and how do you prioritize these gaps to securely protect your network?

Read the whitepaper to learn how a security architecture assessment can identify gaps and roadmap a path to address them.

  • CBTS
  • Network & Perimeter Security
  • Security
  • Details

Virtual Chief Information Security Officer (CISO) Services

by CBTSNov 23, 2021

Qualified CISOs are difficult to find and expensive to employ. A virtual CISO brings needed experience in either an advisory role or with short or long-term projects and could be the answer you've been looking for!

In this whitepaper discover how to improve your business with a Virtual CISO!
• Drive Strategy
• Implement governance
• Develop a roadmap
• Mentor your team

  • CBTS
  • Security platforms
  • Security
  • Details

Penetration Testing

by CBTSNov 23, 2021

Are your current security controls and defenses sufficient to stop a dedicated attacker? A penetration test is the most effective way to determine if your controls, defenses, and processes will withstand — or even detect — a cyber attack, without having to actually suffer a real one.

Is a Penetration Test right for your company? In this whitepaper discover if a Penetration Test is the ideal choice for your company and what to do to stay one step ahead of attackers.

  • CBTS
  • Network & Perimeter Security
  • Security
  • Details

New Uses for Amazon S3 are Creating Security Risks for Your Business. This is Why.

by Perception PointNov 22, 2021

As the usage of AWS S3 increases so have the content types that are stored and shared on it. With this significant shift to the cloud, new security concerns have emerged for organizations that must protect their data. The days of siloed data centers are over. More connectivity means more risk, and the greater the risk, the more protection needed.

Modern enterprises and business application providers must be vigilant about their security and at the same time avoid being held back by

  • Perception Point
  • Risk Management/Security
  • Security
  • Details

The Definitive Guide to BEC — Business Email Compromise Attacks

by Perception PointNov 22, 2021

Impersonation-based attacks are one of the oldest tricks in the book. In fact, a recent FBI report, highlights a 136% increase in losses from BEC attacks in the last two years, resulting in $12.5 billion in losses over the course of 5 years.

Gartner denies BEC (Business Email Compromise) as "phishing emails that do not have a payload such as a URL or attachment. Instead they use impersonation and knowledge of the company structure or common transactions to convince employees to wire

  • Perception Point
  • Risk Management/Security
  • Security
  • Details

Achieving Robust Threat Intelligence

by WickrNov 22, 2021

Threat intelligence is information you collect and analyze that helps you identify potential threats and targets, as well as the intention behind those threats. Good threat intelligence alerts you to potential dangers and enables you to prepare for them. It changes cybersecurity from being reactive (responding to attacks when they take place) to proactively preparing for possible attacks. 85% of industry professionals say threat intelligence is essential to a strong security posture.

  • wickr
  • Cybersecurity
  • Security
  • Details