Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

How to Plan for Tomorrow's SOC, Today

by Cortex by Palo Alto NetworksOct 03, 2022

With threat actors embracing their own versions of digital transformation, exposed threat vectors from a surge in remote access, and record cryptocurrency prices fueling the ransomware frenzy, organizations need to begin their SOC transformation plans sooner rather than later.

Start your SOC transformation journey today. Download our playbook and equip your team to handle evolving cybersecurity risks.

This playbook outlines: Four immediate steps you can take to improve

  • Cybersecurity
  • Security
  • Cortex by Palo Alto Networks
  • Details

Building a Virtual SOC with Cortex

by Cortex by Palo Alto NetworksOct 03, 2022

Want to know how to get best-in-class cybersecurity even if you don't have a security operations center (SOC)? With the right set of tools, you can build a virtual SOC that works wherever your people and systems may be. The Cortex suite of products — Cortex XDR®, Xpanse, and XSOAR — help you lower TCO by automating manual tasks, increasing efficiency and eliminating security silos.

This white paper outlines: How a virtual SOC integrates best-in-class products for

  • Cybersecurity
  • Security
  • Cortex by Palo Alto Networks
  • Details

Building the SOC of the Future

by Dark ReadingOct 03, 2022

While an attacker just needs to find one vulnerability to get in to the network, the defender has to look everywhere. Defenders have to identify, disrupt, and stop attacks in the short period of time between when an attacker gets in and causes damage. One way is a security operations center to get that "all the time" coverage.

What's Inside: AI and cybersecurity response Automation Proctive threat hunting Next-gen SIEM The information submitted is collected by both

  • Dark Reading
  • Cybersecurity
  • Security Monitoring
  • Network & Perimeter Security
  • Details

Enterprise Network Evolution & Modernization

by Interop DigitalSep 29, 2022

Use of video conferencing is growing for remote workers, telemedicine, and e-commerce. Powerful network architectures are more essential than ever, yet much of the country still has no or limited access to broadband. Meanwhile, 5G use slowly rises, while 3G?s sunset will soon leave millions of critical devices in the dark. We're here to help you navigate the future of networking during this interactive and informative event!

  • Video Conferencing / Telepresence
  • Enterprise
  • Details

The 2022 State of Cloud Security Report

by SnykSep 29, 2022

Explore this report to understand the complex cloud security risks and challenges that organizations face in 2022, along with some recommendations. Download the full report to learn more about: The current security posture of cloud security and key concerns and trends in the industry Risks native to cloud infrastructure And how to help developers mitigate them quickly and effectively

  • Snyk
  • Cybersecurity
  • Security
  • Details

The Defender's Advantage Cyber Snapshot

by MandiantSep 28, 2022

Get insights into today's top cyber defense topics based on Mandiant frontline observations and real-world experience.

  • Mandiant
  • Cybersecurity
  • Security
  • Details

Managing Security In a Hybrid Cloud Environment

by PKWareSep 27, 2022

The enterprise cloud environment is not homogenous ? enterprises spread their workloads across private data centers and different public cloud providers. How do you manage security when the tools are all different? How do you enforce security controls consistently across different clouds? In this webinar, experts look at the challenges of managing security in hybrid clouds and share techniques and strategies to create a cohesive security strategy that accounts for different vendors and


Honest Security

by KolideSep 27, 2022

THE TENETS OF HONEST SECURITY

1. The values your organization stands behindshould be well-represented in your security program.

2. A positive working relationshipbetween the end-user and the security team is incredibly valuable and worth fostering.

3. This relationship is built on a foundation of trust that is demonstrated throughinformed consent and transparency.

4. The security team shouldanticipate and expect that end-users use their

  • Kolide
  • Cybersecurity
  • Endpoint Security
  • Details

The State of Zero Trust Report

by FortinetSep 23, 2022

Most organizations claim to either have a zero-trust access (ZTA) or ZTNA strategy either in place or in active deployment. However, most also report that they cannot consistently authenticate users or devices and struggle to monitor users after authentication.

Read the solution brief to learn: How well zero trust and ZTNA are understood The perceived benefits and challenges in implementing a zero-trust strategy Adoption of and the elements included in a zero-trust strategy

  • Fortinet
  • Cybersecurity
  • Security
  • Details

Improve Application Access and Security With Fortinet Zero Trust

by FortinetSep 23, 2022

The massive shift from working in an office to working at home has highlighted many security and connectivity challenges. In addition, today's networks are highly distributed with resources spread across data centers and multiple clouds.

Read the ebook to learn: How to build a Zero Trust Network Access system How to simplify secure connectivity How to reduce the attack surface

  • Fortinet
  • Cybersecurity
  • Security
  • Details