Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Osterman Research-Nation-State Attack Survey: Top CISO Concerns

by AnomaliMar 27, 2020

The Situation Between the United States and Iran is Influencing CISO's Security Strategy and Operations.

Nation-state attacks--in which military of non-military government entities seek to infiltrate other governments, enterprises, or non-commercial organizations--are on the rise. For example, Microsoft revealed in mid-2019 that 8,000 of its enterprise customers had been targeted by these types of attacks during the previous twelve months.

Nation-state attacks are

  • Anomali
  • Security Management & Analytics
  • Risk Management/Security
  • Details

SANS 2020 Cyber Threat Intelligence Survey Results

by AnomaliMar 27, 2020

The Maturation of Cyber Threat Intelligence (CTI)

This year's survey had a record number of respondents (1,006) and the highest ever reporting of Cyber Threat Intelligence (CTI) programs within organizations. 2020 showed 80% of respondents reporting that they produce or consume CTI, an increase of 10% to last year.

As the field reaches maturity, understanding and improving the effectiveness of CTI programs will become more critical. This paper focuses on why finding the

  • Anomali
  • Cybersecurity
  • Security Management & Analytics
  • Details

Global Cloud Proxy Enables VPN Split Tunneling

by Menlo SecurityMar 26, 2020

Coupled with VPN split tunneling, the Menlo Security Global Cloud Proxy with an Isolation Core™ ensures that security policies are applied to all traffic without overwhelming bandwidth and capacity. To learn more, view this brief.

  • Menlo Security
  • Network & Perimeter Security
  • Cloud Security
  • Details

The ROI Story

by NutanixMar 25, 2020

Disruptive technology such as hyper-converged infrastructure tends to significantly complicate the buying decision. It forces new operational procedures and can impact IT governance, security, and compliance. But even a strong financial justification might not be enough to alter the ingrained processes, interests, and cultural norms surrounding the legacy environment. In many cases, it takes an ROI story. This webinar will assist anyone interested in how to use financial analysis as a framework


Alternative Paths to Cloud Contact Center

by SerenovaMar 25, 2020

As we enter a new decade, many companies are looking to replace the premises UC/CC systems they are running with similarly integrated UCaaS/CCaaS solutions. Other companies are separating their enterprise communications decisions from those relating to the contact center ? even if they were both combined on premises in the past. In this webinar,Sheila McGee-Smith, the leading contact center analyst and chair of Enterprise Connect?s contact center track, will give a strategic, insightful


Gartner Report: Top Security and Risk Management Trends

by Palo Alto NetworksMar 24, 2020

See the security trends Gartner believes are ripe for disruption and get their recommendation on how to improve your organization's resilience and defenses.

Download Gartner's new report, "Top Security and Risk Management Trends" to learn why:

• XDR was named one of the top 9 cybersecurity trends
• Security process automation is the key to eliminating repetitive tasks
• AI will create new security responsibilities for protecting digital business initiatives

  • Palo Alto Networks
  • Security Management & Analytics
  • Risk Management/Security
  • Details

MITRE ATT&CK Workbook

by Carbon BlackMar 23, 2020

Divided into 12 Tactics, ATT&CK defines roughly 300 Techniques (TIDs) to define how an adversary can achieve each tactic. The intent of this workbook is to provide a starting point for organizations looking to map to the ATT&CK Framework or simply better their security posture in 3 simple steps. Download our workbook today to learn more!

  • Carbon Black
  • Cybersecurity
  • Endpoint Security
  • Details

Cyber Attack Evasion Techniques

by Deep InstinctMar 23, 2020

When it comes to evasion techniques there?s a perpetual cat and mouse game between malware developers and solutions providers. By drawing on the latest in evasion techniques, malware developers not only go undetected on the compromised machine but more importantly, they hide their malicious indicators and behaviors from detection tools and automated threat analysis systems.

  • Cybersecurity
  • Vulnerabilities & Threats
  • Details

2020 Cybersecurity Outlook Report

by Carbon BlackMar 23, 2020

In the search for clarity in the modern attacker vs. defender battle, it's all about behaviors

The conflict of "good vs. evil" is a theme that's captivated humanity throughout history, spanning religion, ethics, philosophy, politics, art, literature, and cinema. Often with larger-than-life characters leading the narrative, the "good vs. evil" conflict reveals humanity's intrinsic desire to be safe amidst an omniscient and, often, ephemeral sense of fear.

Our goal is to offer a

  • Carbon Black
  • Cybersecurity
  • Security Monitoring
  • Details

Endpoint Security 2020: The Resurgence of EPP and the Manifest Destiny of EDR

by Carbon BlackMar 23, 2020

The big EDR news of 2020 will be about extending EDR beyond the endpoint into other sources of telemetry and other control points such as: the network, the user, and the application. It's about factoring in greater context about applications and infrastructure. Some call this extended EDR — or XDR. The combination of the Carbon Black team with VMware — the digital foundation of mobility, cloud and modern application frameworks — is in the strongest position of anyone to execute

  • Carbon Black
  • Cybersecurity
  • Endpoint Security
  • Details