Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

[Strategic Security Report] Cloud Security's Changing Landscape

by Dark ReadingNov 01, 2017

The rapid migration to cloud services and applications has created a critical need for new strategies and technologies to keep data secure. In this survey, IT security professionals offer insight on their plans for securing data in the cloud. The survey will reveal how quickly cloud services and applications are expanding, the tools and services that organizations are employing to protect them, and enterprise plans for deploying next-generation cloud security technologies such as encryption,

  • Dark Reading
  • Cloud Security
  • Security
  • Details

[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem

by Dark ReadingJun 26, 2017

In 2016, enterprises encountered a range of new exploits and threats -- including ransomware and state-sponsored attacks -- and developed new plans of defense. How will these organizations be investing their cybersecurity budgets and staffing in the next 12 months? What tools and best practices do they consider most important, and which emerging technologies are they implementing? This report, one of three to come out of Dark Reading's annual Strategic Security Survey, offers insight on how

  • Dark Reading
  • Cybersecurity
  • Security Monitoring
  • Details

[Strategic Security Report] Navigating the Threat Intelligence Maze

by Dark ReadingDec 15, 2017

Over the past few years, enterprises have gained access to vast new resources of information about cybersecurity threats. New services that collect information about external threats are being combined with existing technologies for analyzing security events. Enterprises are better able to assess potential threats by correlating data from multiple sources to measure risk and prioritize defenses. How are organizations harnessing these new information resources? In this survey, IT security

  • Dark Reading
  • Cybersecurity
  • Risk Management/Security
  • Security
  • Details

10 Best Practices That Could Reshape Your IT Security Department

by Dark ReadingNov 06, 2018

This is Dark Reading's November Tech Digest, explores ten best practices that could reshape IT security departments.

IN THIS REPORT: 10 Best Practices That Could Reshape Your IT Security Department Managing Data the Way We Manage Money The Cloud Security Conundrum: Assets vs. Infrastructure Think Like an Attacker: How a Red Team Operates

  • Dark Reading
  • Security
  • Strategic CIO
  • IT Strategy
  • Security platforms
  • Cybersecurity
  • Network & Perimeter Security
  • Details

10 Career Moves You Can Make in 2019

by InformationWeekFeb 14, 2019

If you work in IT, chances are pretty good that you are perfectly happy with your current job. But that doesn't mean you should put your career on autopilot. Here are 10 career moves you should consider making in 2019, whether you plan to pursue a new position now or if you simply want to have relevant skills to offer current and future employers.

Image: Pixabay

  • InformationWeek
  • Professional Development and Salary Data
  • Team Building & Staffing
  • Details

10 Critical Issues to Cover in Your Vendor Security Questionnaire

by PanoraysApr 17, 2020

Companies must carefully check their vendors' cyber posture, and the initial vetting of any third party usually begins with a comprehensive security questionnaire. What are the key questions that must be addressed to determine if vendors have a strong cyber posture?

Download this guide to learn the most important ones to consider, including: Does customer data leave the vendor's production systems? Does the vendor support single sign-on? Does the vendor have an employee security

  • Panorays
  • Cybersecurity
  • Risk Management/Security
  • Details

10 Emerging Threats Every Enterprise Should Know About

by Dark ReadingAug 13, 2018

This Dark Reading's August Tech Digest explores ten emerging security threats to enterprise data.

IN THIS REPORT: 10 Emerging Threats Every Enterprise Should Know About Trading Platforms Riddled with Severe Flaws Cracking Cortana: The Dangers of Flawed Voice Assistants Demystifying Mental Health in the Infosec Community New Hack Weaponizes the Web Cache

  • Dark Reading
  • Security
  • Security Monitoring
  • Security Management & Analytics
  • Risk Management/Security
  • Cloud Security
  • Cybersecurity
  • Details

10 Essential Capabilities of a Modern SOC

by SplunkApr 30, 2020

Security teams are hard at work on the front lines: identifying, analyzing and mitigating threats facing their organization. But despite their best efforts, incident backlogs continue to grow. The reality is that there simply aren't enough skilled professionals to analyze the volume of incidents that most organizations face.

But a modern security operations center (SOC), powered by and built on a data-to-everything platform, has visibility across the entire enterprise. A single suite

  • Splunk
  • Security Management & Analytics
  • Security platforms
  • Details

10 Hot Talks From Black Hat USA 2021

by Dark ReadingSep 29, 2021

Enterprise defenders keep tabs on a dizzying array of new vulnerabilities, threats, and security tools throughout the year to ensure their security roadmap is up-to-date. They have to adjust their strategic priorities to reflect the fact that black-hat attackers and white-hat researchers are continuously developing exploits and innovative attack techniques. This report highlights 10 of the hottest talks at this summer's Black Hat USA conference as well as recent developments in DNS security.

  • Dark Reading
  • Cybersecurity
  • Security Monitoring
  • Network & Perimeter Security
  • Cloud Security
  • Details

10 Must-Have Capabilities for Stopping Malicious Automation Checklist

by KasadaFeb 16, 2021

One thing is certain: Stopping bot attacks before they can impact your business, customers, shareholders, and bottom line requires a different approach than traditional solutions, one that helps you win the battle against malicious automation.

Get your copy of this checklist to learn:
• What other bot providers aren't telling you that you need to know
• The most important capabilities to stop automated attacks
• How Kasada can help win the war on bad bots

  • Kasada
  • Network & Perimeter Security
  • Security Management & Analytics
  • Details