Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

The State of Ransomware

by Dark ReadingOct 03, 2017

Ransomware is hitting enterprises at an alarming rate. Is your organization prepared? Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. Now well beyond the incipient stage of opportunistic attacks, this automated form of blackmail has increased in prevalence and sophistication. The malware now targets organizations of all sizes as the bad guys look for ways to extort money and create trouble for businesses by taking their data hostage. This

  • Dark Reading
  • Security Monitoring
  • Cybersecurity
  • Details

[Strategic Security Report] Cloud Security's Changing Landscape

by Dark ReadingNov 01, 2017

The rapid migration to cloud services and applications has created a critical need for new strategies and technologies to keep data secure. In this survey, IT security professionals offer insight on their plans for securing data in the cloud. The survey will reveal how quickly cloud services and applications are expanding, the tools and services that organizations are employing to protect them, and enterprise plans for deploying next-generation cloud security technologies such as encryption,

  • Dark Reading
  • Cloud Security
  • Security
  • Details

[Strategic Security Report] Navigating the Threat Intelligence Maze

by Dark ReadingDec 15, 2017

Over the past few years, enterprises have gained access to vast new resources of information about cybersecurity threats. New services that collect information about external threats are being combined with existing technologies for analyzing security events. Enterprises are better able to assess potential threats by correlating data from multiple sources to measure risk and prioritize defenses. How are organizations harnessing these new information resources? In this survey, IT security

  • Dark Reading
  • Cybersecurity
  • Risk Management/Security
  • Security
  • Details

Top IT Trends for 2018

by InformationWeekMar 26, 2018

This InformationWeek Trend Report explores the hot trends for 2018 and how IT organizations like yours will be experimenting with them.

IN THIS REPORT: Learn how to identify the major trends that will affect your IT environment in the coming year Find out where IT organizations will be focusing their infrastructure investments in 2018 Look beyond doubts and fears of public cloud to develop a cloud strategy that works best for your needs And more.

  • InformationWeek
  • IT Strategy
  • Strategic CIO
  • Executive Insights & Innovation
  • Details

[Slideshow] 7 Key Stats that Size Up the Cybercrime Deluge

by Dark ReadingApr 26, 2018

Now that we've got a couple of months from this year in the rearview mirror, security researchers have had enough time to crunch the numbers from 2017. That means a raft of new reports analyzing last year's cybersecurity data with updated telemetry on the threat landscape, economic impact, and defense problems facing the cybersecurity industry. Here are some of the most illuminating highlights.

  • Dark Reading
  • Security
  • Endpoint Security
  • IT Strategy
  • Risk Management/Security
  • Cybersecurity
  • Details

[Slideshow] 7 Steps to a Smooth, Secure Cloud Transition

by Dark ReadingApr 27, 2018

If you're thinking with a cloud-first mindset, you should be making sure all the right boxes are checked before you make the leap. Here, security experts highlight the most important steps to keep in mind while moving to the cloud. Find out what they had to say.

  • Dark Reading
  • Cloud Security
  • Cloud Services
  • Cloud
  • Security
  • Risk Management/Security
  • Details

[Slideshow] 10 Mistakes End Users Make That Drive Security Managers Crazy

by Dark ReadingApr 27, 2018

We pinpointed 10 common ways employees mishandle - and inadvertently breach - an organization's security. Find out what they are here.

  • Dark Reading
  • Security
  • Endpoint Security
  • Risk Management/Security
  • IT Strategy
  • Network & Perimeter Security
  • Details

The Next Generation of IT Support

by InformationWeekJun 08, 2018

This InformationWeek Trend Report explores the shift to a distributed workforce and how IT can enable and support the transition.

IN THIS REPORT:

• Explore how emerging technologies like artificial intelligence and machine learning are improving tools for collaboration, help desk support, and network and systems monitoring
• Learn about the benefits of a remote workforce and how to overcome the challenges of IT support
• Understand how the cloud is

  • InformationWeek
  • IT Strategy
  • Infrastructure
  • Networking
  • Unified Communications
  • Cloud Infrastructure
  • Applications
  • Careers
  • Virtualization
  • Strategic CIO
  • Infrastructure as a Service
  • Platform as a Service
  • Details

The State of IT and Cybersecurity

by Dark ReadingJun 11, 2018

As cybersecurity has grown and become more critical in recent years, it increasingly has become viewed as a discipline separate from general IT. In many companies, the security department works independently of the IT department; in some companies, the chief information security officer (CISO) reports to someone other than the head of IT.

This report from Dark Reading shows today's IT groups play a critical role in information security — a role that is more extensive and more

  • Dark Reading
  • Cybersecurity
  • Security Management & Analytics
  • Details

Cybersecurity Strategies for the Digital Era

by InformationWeekJun 11, 2018

This InformationWeek Trend Report explores several areas of information security that are critical to ensuring the growth of the modern business.

IN THIS REPORT:
• Learn how cybersecurity initiatives can contribute to new business growth
• Find out how digital and physical security must work together and read our 4-step plan for implementation
• Explore strategies for integrating DevOps into IT security to improve application security and performance

  • InformationWeek
  • IT Strategy
  • Strategic CIO
  • Risk Management/Security
  • Security
  • Security Monitoring
  • Mobile security
  • Endpoint Security
  • Security Management & Analytics
  • Cybersecurity
  • Network & Perimeter Security
  • Cloud Security
  • Details