Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

DZone: Shifting Left With Continuous Delivery

by BMC SoftwareMay 14, 2019

As IT complexity increases, the value of DevOps continues to explode. Find out how you can build a culture of collaboration, rapid release, and consistent excellence in your organization so you can:

• Create and support app-driven business models
• Make the right investments in DevOps tools and projects
• Increase employee productivity, speed, and satisfaction

  • BMC Software
  • Application acceleration
  • Information Management
  • Details

Embracing the Looming Challenge of 100% Encryption

by ExtraHopMay 13, 2019

Encryption is skyrocketing both inside corporate networks and on the public internet--and studies show that more and more attackers are utilizing numerous trends to hide their activities from your SOC. Luckily, there are methods you can use to embrace encryption in the enterprise without sacrificing your ability to see, hunt, and stop attackers.

Read the report for a deep dive into:

• Why decryption capabilities are crucial for the modern SOC
• The two primary methods

  • ExtraHop
  • Security Management & Analytics
  • Security
  • Details

Building and Managing an IT Security Operations Program

by Dark ReadingMay 13, 2019

As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.

Here's what's inside:

• Building and Managing an IT Security Operations Program
• Here's What Happened When a SOC Embraced Automation
• Solving Security: Repetition or Redundancy?

  • Dark Reading
  • Cybersecurity
  • Database Security
  • Endpoint Security
  • Security Monitoring
  • Risk Management/Security
  • Details

Gartner Magic Quadrant for Network Performance Monitoring and Diagnostics

by ExtraHopMay 13, 2019

ExtraHop is the first vendor to move to into the Leader quadrant of Gartner's Magic Quadrant for Network Performance Monitoring and Diagnostics since its inception. We believe this reflects our innovation in the NPMD space as well as our commitment to uniting IT and Security professionals with complete visibility, real-time detection, and guided investigations that deliver performance and security from the inside out. Click download to receive your complimentary copy of the report!

  • ExtraHop
  • Security Monitoring
  • Security Management & Analytics
  • Details

The State of IT Operations and Cybersecurity Operations

by Dark ReadingMay 13, 2019

Conventional wisdom about today's data centers holds that IT and network operations centers (NOCs) and security operations centers (SOCs) are separate organizations staffed by separate teams using different technologies. But in practice, IT operations and security operations are often tightly intertwined, involving overlapping functions and a wide range of common challenges.

How are today's IT operations teams working with security teams? Which functions are assigned to which teams, and

  • Dark Reading
  • Cybersecurity
  • Security Management & Analytics
  • Details

The 5 Uncomfortable Truths About Phishing Defense

by CofenseMay 10, 2019

The Truth Will Set You Free--and Strengthen Your Phishing Defense

Get out of your comfort zone and embrace the truth about phishing defense and today's rapidly changing threat landscape. When over 90% of breaches start as phishing emails--threats that email gateways miss and other defenses are slow to stop--you need to stare the truth in the eye and rethink your approach.

  • Cofense
  • Security Monitoring
  • Security Management & Analytics
  • Details

The CISO Challenge

by Thycotic SoftwareMay 09, 2019

New research highlights key management and communication issues facing those responsible for cyber security, including entrenched perceptions by senior leadership and employees. Nearly 50% of cyber security professionals, for example, believe executive boards see them in just a maintenance role, rather than a source of innovation that contributes to the business. Given the enormous impact of security breaches and the increase in compliance requirements, CISOs need to communicate the value of


Building an Incident Readiness and Response Playbook

by Anomali, Inc.May 08, 2019

The cyber attackers hit their mark: now what do you do? Whom do you call first? Do you have a plan to contain the damage, eliminate the threat, avoid destruction of forensic evidence, and keep the business operational at the same time? Do you know how to uphold compliance requirements, address customer questions, and pay for all the unforeseen costs of an emergency? Don't make a data breach any harder than it needs to be. In this webinar, learn the Xs and Os of any good security incident


Why It’s Time to Go Mobile-Only

by VerizonMay 08, 2019

If your company has yet to cut the cord and go mobile-only, now may be the perfect time to make the move, as preferred business communications migrates from premises-based systems to UC as a Service (UCaaS). Please join us on May 8th at 11am PT / 2pm ET to learn about the latest mobility trends in the workforce, the value of mobile UCaaS, and why companies of all sizes should consider evaluating this technology.

  • Mobile
  • Mobile Enterprise
  • Mobile Devices
  • Unified Communications
  • Details

The Cost of Third-Party Cybersecurity Risk Management

by CyberGRXMay 07, 2019

A recent CyberGRX study finds a large disparity between the importance of third-party cyber risk management (TPCRM) versus how ineffective current practices are throughout all major industries. Findings show that organizations must move to a far more scalable and quantitative method of evaluation to reduce third-party cyber exposure and bring confidence to TPCRM.

  • Cybersecurity
  • Risk Management/Security
  • CyberGRX
  • Details