Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

How is the Emergence of Communications Technology Impacting the Enterprise’s Digital Transformation?

by BICSFeb 21, 2023

Enterprises? digital transformations in recent years have been impacted by multiple factors ? globalization, the rise of IoT, or changes to customer behavior and demands. Undeniably, the COVID-19 pandemic accelerated changes in workplace culture which also contributed to the adoption of new technologies.

However, the increase in the channels and technologies used often leads to an increase in complexity that impacts most, if not all, of the business areas. A way to minimize this


3 Real-World Challenges Facing Cybersecurity Organizations: How an Exposure Management Platform Can Help

by TenableFeb 21, 2023

Implementing an exposure management program enables security professionals to better allocate time and resources so they can focus on taking the actions that legitimately reduce their risk.

Read this whitepaper to learn about: 3 real-world challenges facing cybersecurity organizations The building blocks of an exposure management program Key benefits of an exposure management platform 3 things to look for in an exposure management platform Introducing the Tenable One Exposure

  • Tenable
  • Cybersecurity
  • Security
  • Details

POV: Securing Application Journeys from Data Center to Cloud

by FortinetFeb 21, 2023

The fluid nature of applications means that they can live anywhere from data centers to clouds. The trick to securing them anywhere they live is to meet them there. Get the POV to learn: The state of digital transformation Challenges and trends How to secure the application journey

  • Fortinet
  • Cloud Security
  • Security platforms
  • Details

Solution Brief: Secure Application Journey Solutions

by FortinetFeb 21, 2023

Empower your organization with consistent, secured, and optimized tools to build, deploy, and run cloud applications across all deployments with Fortinet solutions: FortiGate for all edges FortiWeb to secure web apps FortiCNP for all clouds FortiEDR to secure workloads

  • Fortinet
  • Cloud Security
  • Security platforms
  • Cloud Services
  • Details

Global Perspectives on Threat Intelligence

by MandiantFeb 21, 2023

Learn how 1,350 decision-makers are navigating an evolving global threat landscape and how to protect your organization.

  • Mandiant
  • Cybersecurity
  • Security
  • Details

Mandiant Cyber Security Forecast 2023

by MandiantFeb 21, 2023

Get Mandiant's observations and expert insights on the threats and trends that matter most to your organization in 2023.

  • Mandiant
  • Cybersecurity
  • Security
  • Details

Checklist: Top 3 Considerations to Simplify and Holistically Secure Your Application Journey

by FortinetFeb 20, 2023

Your application journey to the cloud can cause security and operational challenges if you aren't prepared. Ensure greater visibility and security effectiveness with these three key points: Seamless integration Deployment anywhere Flexible consumption models

  • Fortinet
  • Cloud
  • Cloud Services
  • Details

Think Like An Attacker – Your Guide to Cloud Security with Attack Surface Management

by CensysFeb 16, 2023

How are you protecting your organization's expanding cloud presence?

Protecting assets in the cloud can pose a unique challenge for security teams. A single misconfiguration — like a storage bucket or database — can lead to a catastrophic data breach.

As more assets move from fixed IP addresses to the ephemeral cloud, visibility can be lost, and the challenge of managing and inventorying what an organization owns can be increasingly difficult — especially

  • Censys
  • Cybersecurity
  • Risk Management
  • Cloud Security
  • Details

The Threat Profiler’s Playbook: 6 Steps to Uncovering Ransomware (& Other Nefarious Activity)

by CensysFeb 16, 2023

How much do you understand about the threats you uncover?

As a threat profiler, finding a potential threat is only half your battle. Your next task is making sure the threat is critically understood. In other words, how do you know it's a threat, and how does it pose a risk?

The Censys Research team set out to tackle just that in our own threat profiling expedition. Using the Censys Search tool, we uncovered multiple hosts with Russian ransomware, and collected the evidence

  • Censys
  • Cybersecurity
  • Risk Management
  • Security
  • Details

The 2022 State of Risk & Remediation Report

by CensysFeb 16, 2023

When your business accelerates faster than your security, effectively monitoring attack surfaces and responding to major vulnerabilities can be difficult. And if you wait days, weeks, or even months to respond — the consequences could be catastrophic.

That's why in the 2022 State of Risk & Remediation Report, the Censys Research Team examined recent celebrity vulnerabilities and how organizations across industries reacted to each. What did we learn, and how can you apply these

  • Censys
  • Cybersecurity
  • Risk Management
  • Cloud Security
  • Details