TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

5 Emerging Cyber Threats to Watch for in 2019

by Dark ReadingFeb 07, 2019

Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.

IN THIS ISSUE: 5 Emerging Cyber Threats to Watch for in 2019Who Takes Responsibility for Cyberattacks in the Cloud? Spending Spree: What's on Security

  • Dark Reading
  • Security
  • Risk Management/Security
  • Cybersecurity
  • Network & Perimeter Security
  • Details

Kubernetes Security – Operating Kubernetes Clusters and Applications Safely

by Aqua Security Software Inc.Feb 07, 2019

Liz Rice from Aqua Security and Michael Hausenblas from Red Hat describe practical security techniques for Kubernetes. Developers will learn how to build container images with security in mind, and ops folks will pick up techniques for configuring and operating a Kubernetes cluster more securely.

  • Aqua Security Software Inc.
  • Cloud Security
  • Security
  • Details

Forrester Research - Now Tech, Container Security, Q4 2018

by Aqua Security Software Inc.Feb 07, 2019

This report provides an objective review of security vendors that embed security controls in containers across the software delivery life cycle to addresses security concerns.

  • Aqua Security Software Inc.
  • Cloud Security
  • Security
  • Details

Securosis Analyst Report - The Complete Guide to Enterprise Container Security

by Aqua Security Software Inc.Feb 07, 2019

In this comprehensive report, Securosis provide a complete overview of the security implications of using containers and actionable insights for implementing best practices.

  • Aqua Security Software Inc.
  • Cloud Security
  • Security
  • Details

2018 Secure DevOps: Fact or Fiction?

by Aqua Security Software Inc.Feb 07, 2019

A deep dive into how security fits into DevOps, where security risks are, how they are being managed, and the top success factors in implementing a Secure DevOps program

  • Aqua Security Software Inc.
  • Cloud Security
  • Security
  • Details

Security in the New World of Containers and Serverless

by Aqua Security Software Inc.Feb 07, 2019

This eBrief offers expert advice and insights from thought-leaders who are actively defining the container and serverless security landscape. The "shift left" approach is the new DevSecOps discipline that is redefining security.

  • Aqua Security Software Inc.
  • Cloud Security
  • Security
  • Details

[SANS] The Need for Speed: Integrated Threat Response

by LookingGlass Cyber Solutions, Inc.Feb 06, 2019

This paper discusses the concepts of security automation and integration and provide recommendations on how to use automated technology to make your team faster and more efficient. It's time security teams have a tool to keep up with modern attacks.

  • LookingGlass Cyber Solutions, Inc.
  • Cybersecurity
  • Security Monitoring
  • Details

EMA Radar Summary for Network-Based Security Analytics: Q3 2018

by Awake SecurityFeb 04, 2019

MAs evaluation is based on analysis of over 100 different KPIs in five primary categories: Deployment and Administration, Cost Advantage, Architecture and Integration, Functionality, and Vendor Strength. Awake has been recognized for providing the greatest balance between features and costs when compared to a dozen other vendors evaluated in the Enterprise Management Associates Radar™ report on network security analytics. "Network traffic analysis is proving to be a critical tool for

  • Awake Security
  • Cybersecurity
  • Security Management & Analytics
  • Details

Left of Breach

by CofenseFeb 01, 2019

Want to Avoid Attacks? Think Like the Marines. The Marines are tough, but they're smart too. That's why they anticipate risks to stay "left of bang" on the battlefield and reduce their losses. Download this Cofense e-book and learn to use similar thinking to strengthen your phishing defense and keep your company "left of breach."

  • Cofense
  • Cybersecurity
  • Security Monitoring
  • Details

You’re Only as Strong as Your Weakest Third Party

by LookingGlass Cyber Solutions, Inc.Feb 01, 2019

Third party breaches are on the rise and relying on point-in-time assessments won't protect you from tomorrow's breach. Learn how a continuous monitoring program will help your security team monitor, respond, and remedy vendor threats in real-time.

  • LookingGlass Cyber Solutions, Inc.
  • Security
  • Cybersecurity
  • Details