Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

The State of IT Operations and Cybersecurity Operations

by Dark ReadingMay 13, 2019

Conventional wisdom about today's data centers holds that IT and network operations centers (NOCs) and security operations centers (SOCs) are separate organizations staffed by separate teams using different technologies. But in practice, IT operations and security operations are often tightly intertwined, involving overlapping functions and a wide range of common challenges.

How are today's IT operations teams working with security teams? Which functions are assigned to which teams, and

  • Dark Reading
  • Cybersecurity
  • Security Management & Analytics
  • Details

The 5 Uncomfortable Truths About Phishing Defense

by CofenseMay 10, 2019

The Truth Will Set You Free--and Strengthen Your Phishing Defense

Get out of your comfort zone and embrace the truth about phishing defense and today's rapidly changing threat landscape. When over 90% of breaches start as phishing emails--threats that email gateways miss and other defenses are slow to stop--you need to stare the truth in the eye and rethink your approach.

  • Cofense
  • Security Monitoring
  • Security Management & Analytics
  • Details

The CISO Challenge

by Thycotic SoftwareMay 09, 2019

New research highlights key management and communication issues facing those responsible for cyber security, including entrenched perceptions by senior leadership and employees. Nearly 50% of cyber security professionals, for example, believe executive boards see them in just a maintenance role, rather than a source of innovation that contributes to the business. Given the enormous impact of security breaches and the increase in compliance requirements, CISOs need to communicate the value of


Building an Incident Readiness and Response Playbook

by Anomali, Inc.May 08, 2019

The cyber attackers hit their mark: now what do you do? Whom do you call first? Do you have a plan to contain the damage, eliminate the threat, avoid destruction of forensic evidence, and keep the business operational at the same time? Do you know how to uphold compliance requirements, address customer questions, and pay for all the unforeseen costs of an emergency? Don't make a data breach any harder than it needs to be. In this webinar, learn the Xs and Os of any good security incident


Why It’s Time to Go Mobile-Only

by VerizonMay 08, 2019

If your company has yet to cut the cord and go mobile-only, now may be the perfect time to make the move, as preferred business communications migrates from premises-based systems to UC as a Service (UCaaS). Please join us on May 8th at 11am PT / 2pm ET to learn about the latest mobility trends in the workforce, the value of mobile UCaaS, and why companies of all sizes should consider evaluating this technology.

  • Mobile
  • Mobile Enterprise
  • Mobile Devices
  • Unified Communications
  • Details

The Cost of Third-Party Cybersecurity Risk Management

by CyberGRXMay 07, 2019

A recent CyberGRX study finds a large disparity between the importance of third-party cyber risk management (TPCRM) versus how ineffective current practices are throughout all major industries. Findings show that organizations must move to a far more scalable and quantitative method of evaluation to reduce third-party cyber exposure and bring confidence to TPCRM.

  • Cybersecurity
  • Risk Management/Security
  • CyberGRX
  • Details

A No Hassle Guide to Effective Third-Party Risk Management

by CyberGRXMay 07, 2019

Get your guide to identify risks, reduce costs and scale with CyberGRX. Discover how to prioritize third-party vendors who present the greatest risk to your organization, focus on proactive mitigation with dynamic & measurable data, and gain clear visibility into the full scope of your threat landscape.

  • Cybersecurity
  • Risk Management/Security
  • Details

Vendor Risk Management Guide: The 3 Fundamentals

by CyberGRXMay 07, 2019

This CyberGRX guide provides high-level instruction regarding the basic components of a complete vendor risk management (VRM) program, including Vendor Classification for a risk-based approach, Prioritized Assessment strategies, and Issue Management to scale for the long term.

  • Cybersecurity
  • Risk Management/Security
  • Details

Vendor Risk Management Fundamentals: A Checklist

by CyberGRXMay 07, 2019

There are many ways to slice and dice your cyber risk management program, a critical practice in today's world of complex ecosystems and imperative data protection. Get your copy of the CyberGRX Vendor Risk Management checklist to see best practice recommendations for the components of a complete VRM program.

  • Cybersecurity
  • Risk Management
  • CyberGRX
  • Details

Analytics: The Key to Identifying and Mitigating Third-Party Risk

by CyberGRXMay 07, 2019

Analytics can help you identify and pinpoint third-party cyber risk across your entire ecosystem. Download the CyberGRX whitepaper to learn how to gain more insights with analytics.

  • Cybersecurity
  • Risk Management
  • CyberGRX
  • Details