Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Understanding Cyber Attacks on Remote Workers

by Menlo SecurityMay 10, 2022

Following the COVID-19 quarantines, companies made a massive shift to remote and home working ? and created a new range of opportunities for cyber attackers. While early attacks focused on phishing and credential theft, today cyber criminals are compromising corporate data via home Wi-Fi, poorly secured endpoints, and vulnerable mobile devices. In this webinar, experts discuss some of the cyber attacks that have been made on end-users working from home, as well as exploits against remote


2022 IT Salary Survey

by InformationWeekMay 10, 2022

2021 was a year of transition. After all, the pandemic illuminated the importance of technology. Are you wondering what the outlook is for 2022?

Our IT Salary Survey will give you what you need to know as you plan your next career move (or decide to stay right where you are).

Topics covered: Median Salary - find out if it went up, down or stayed the same? Gender Gap - discover if IT has started to fill the gap or has it grown? Raises - learn what % of IT Pros got a

  • InformationWeek
  • Professional Development and Salary Data
  • IT Strategy
  • IT Leadership
  • Details

Dark Reading: Close the Visibility Gap

by ExtraHopMay 10, 2022

Broad adoption of encryption technologies is causing major shifts in the security operations and cyber threat landscape. This has led to changes in attacker techniques, creating fertile ground for the evolution of a new breed of advanced attacks.

As attackers grow more sophisticated, and regulations require tighter security and privacy measures, there is no escaping the decision to encrypt. Organizations must find a way to balance the increasing expectations for data security and data

  • Risk Management/Security
  • Cybersecurity
  • ExtraHop
  • Details

A Practical Guide for Shields Up - For Organizations

by ExtraHopMay 10, 2022

In response to the Russia-Ukraine conflict, the Cybersecurity and Infrastructure Security Agency (CISA) issued its first-ever Shields Up notice, warning that with its cyber capabilities and history of targeting Western governments and corporations, cyberattacks from Russia are likely, if not imminent.

Since its inception in 2018, the U.S. Cybersecurity & Infrastructure Security Agency (CISA) has worked to provide critical guidance and information to government and private sector

  • Cybersecurity
  • Risk Management
  • ExtraHop
  • Details

The Key to an Effective Cybersecurity Strategy: Hands-on Training

by RangeForceMay 09, 2022

The Key to an Effective Cybersecurity Strategy: Hands-on Training

Today's security landscape has no shortage of tools and technologies. But unless the people using those tools are continuously upskilling, your cybersecurity strategy is costing you time and money.

Read "The Key to an Effective Cybersecurity Strategy" to learn: How to equip your team to effectively use tools at their disposal The importance of layered security The risks of not providing adequate

  • RangeForce
  • Cybersecurity
  • Team Building & Staffing
  • IT Strategy
  • Details

Ransomware Insights 2022

by RangeForceMay 09, 2022

Ransomware Insights 2022: Understand & Defend Against Ransomware

Ransomware, one of the most pervasive forms of malware, is a major threat to organizations of every size and type. In Ransomware Insights 2022, you'll learn: Top security protocols for organizational cyber defense readiness against ransomware How ransomware strikes, including the top access vectors and vulnerabilities Insights from both sides of the "to-pay-or-not-to-pay" debate

  • RangeForce
  • Cybersecurity
  • Risk Management
  • Details

How Barclays Upskills a Global Security Team with RangeForce

by RangeForceMay 09, 2022

How Barclays Upskills a Global Security Team with RangeForce

Security breaches present a serious risk to the financial services industry. To minimize the possibility of a successful cyber attack, the Barclays team needed a robust partner that could help improve the organization's cyber defense capabilities and operational readiness.

Read the case study to see how Barclay's: Improved security culture, coordination, and cooperation across global teams Increased the

  • RangeForce
  • Cybersecurity
  • Risk Management/Security
  • Financial generic
  • Details

IoT and OT: Evolving Cyberthreats and Strategies for Risk Mitigation

by Microsoft SecurityMay 09, 2022

The recent proliferation of attacks against IoT and OT systems is driving increased awareness of the extent that virtual attacks can cause harm in physical scenarios, making IoT and OT security a high-priority issue. Mitigating these vulnerabilities requires taking an integrated, holistic approach that spans the entire organization and applies the same Zero Trust principles implemented in IT security.

This e-book discusses the current threat landscape, compiled from research

  • Microsoft Security
  • Cybersecurity
  • Security
  • Details

IT and OT Convergence Is Happening, but Is Security Ready?

by Microsoft SecurityMay 09, 2022

The growth of connected devices has presented CISOs across all industries - from automotive to waste management - with dramatically more vulnerable networks and larger threat landscapes. With comprehensive security that eliminates blind spots, provides continuous detection, enables rapid response and hardens security, they can be fearless.

For deeper insights on securing networks with both IT and OT devices, check out our eBook: IT and OT convergence is happening, but is security

  • Microsoft Security
  • Cybersecurity
  • Security
  • Details

How to Plan for Tomorrow’s SOC, Today

by Palo Alto Networks I CortexMay 09, 2022

2020 was a year under siege, from COVID-19 and work-from-home realities to sophisticated supply chain attacks like SolarWinds. Through it all, global network infrastructures have never felt more vulnerable.

This playbook outlines: 4 immediate steps you can take to improve SOC efficiencies 3 security technologies that are key to future-proofing your SOC How these technologies complement and strengthen any SecOps team Get started on SOC transformation efforts today to harden

  • Palo Alto Networks I Cortex
  • Security platforms
  • Cybersecurity
  • Risk Management/Security
  • Details