Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Banking

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







Service Account Security for Dummies eBook

by ThycoticJan 21, 2020

Get control of service account sprawl and develop a strategy to properly protect and secure service account access to lock down your privileged account attack surface. Learn about service account governance and day-to-day best practices, and the key criteria for managing them with automated cyber security tools.


2019 State of Privileged Access Management (PAM) Maturity Report

by ThycoticJan 21, 2020

With up to 80 percent of breaches due to compromised credentials, more organizations than ever before are prioritizing privileged account protection. Thycotic's "State of PAM Maturity" report highlights the disturbing results based on more than 450 responses worldwide to our online PAM Maturity Assessment.

See the three major key takeaways from the survey and recommendations for action in the complete 2019 State of Privileged Access Management (PAM) Maturity Report.
85% are still


Privileged Account Incident Response Template

by ThycoticJan 21, 2020

Thycotic's free Privileged Account Incident Response template is designed to prevent a cyber breach from becoming a cyber catastrophe. It helps IT operations, security and incident response teams form a united front against an attack to coordinate actions and maintain business continuity.


Black Hat 2019 Hacker Survey Report

by ThycoticJan 21, 2020

Both hackers and security pros strongly agree that service accounts are an attractive target because hackers can easily elevate privileges and gain access to sensitive information. Yet one in three security pros say service account passwords are changed only after an incident or never rotated!


eSentire Annual Threat Intelligence Report: 2019 Perspectives and 2020 Predictions

by eSentireJan 15, 2020

Eliminate guesswork and get in-depth insights to navigate the ever-changing cybercrime landscape. This data-laden, incident-rich report delivers insider info on threat actors, their motivations, tactics and targets so you can make better informed security strategy decisions. Key insights include: Decade-old, state-funded espionage campaigns are still actively collecting from unwittingly compromised organizations Organized cybercrime is reaching new heights of social organization and role


Are SAST Tools Glorified Grep?

by Synopsys, IncJan 15, 2020

Even with a strong architecture and design, application code can still harbor vulnerabilities. Developers can make unintentional mistakes. Teams can also take shortcuts to achieve milestones or enhanced functionalities.

Static application security testing (SAST) is a form of white box . testing that discovers such vulnerabilities in an application's code. Using SAST tools to identify bugs early in the development life cycle reduces the time and cost of remediation.

This


Building security into the DevOps life cycle

by Synopsys, IncJan 15, 2020

The primary goal when breaking the build in the CI/CD DevOps life cycle is to treat security issues with the same level of importance as quality and business requirements. If quality or security tests fail, the continuous integration server breaks the build.

When the build breaks, the CI/CD pipeline also breaks. Based on the reason for the broken build, appropriate activities such as architecture risk analysis (ARA), threat modeling, or a manual code review are triggered.


How to Navigate the Intersection of DevOps and Security

by Synopsys, IncJan 15, 2020

As organizations embrace DevOps, developers and operations work closely together to push new software out rapidly, while improving the quality and making customers happy. However, with speed comes risk. How can these teams build security into their new DevOps culture to ensure secure, high-quality software?

This eBook provides actionable insight into: What DevOps is and how security fits in The tools you need to implement DevSecOps How to train your team in the culture of


IT 2020: A Look Ahead

by Informa TechJan 08, 2020

Are you ready for the critical changes that will occur in 2020? We've compiled editor insights from the best of our network (Dark Reading, Data Center Knowledge, InformationWeek, ITPro Today and Network Computing) to deliver to you a look at the trends, technologies, and threats that are emerging in the coming year.

Inside: IT 2020: A Look Ahead 15 Technology Predictions for 2020 8 Impactful Enterprise Technologies in 2020 The Most Important Agile Trends to Follow in 2020


Orchestrate Risk and Vulnerability Management Across the Software Development Life Cycle

by ZeroNorthJan 03, 2020

ESG Solution Showcase: Orchestrating Risk and Vulnerability Management across the Software Development Life Cycle (SDLC), from Code Commit through Build to Deployment

With the continuing complexity of application and infrastructure testing, there is a need for a single orchestration platform that can simplify the process of managing scanning tools and technologies. Analyst firm ESG outlines application and infrastructure challenges facing security leaders and how they are addressing them.


SUBTOPICS:

eSentire

eSentire is the largest pure-play Managed Detection and Response (MDR) service provider, keeping organizations safe from constantly evolving cyber-attacks that technology alone cannot prevent. Its 24x7 Security Operations Center (SOC), staffed by elite security analysts, hunts, investigates, and responds in real-time to known and unknown threats before they become business-disrupting events. Protecting more than $6 trillion in corporate assets, eSentire absorbs the complexity of cybersecurity, delivering enterprise-grade protection and the ability to comply with growing regulatory requirements.


Informa Tech

Headquarters: 5 Howick Place, London, SW1P 1WG

Informa Tech is a market leading B-to-B information provider with depth and specialism in the Information and Communications (ICT) Technology sector. Our purpose is to inspire the technology community to design, build and run a better digital world... and we do this by informing, educating and connecting those communities via our research, digital media, events and training products and services.


Thycotic

Headquarters: Washington DC

Thycotic is the leading provider of cloud-ready privilege management solutions. Thycotic's security tools empower over 10,000 organizations, from small businesses to the Fortune 500, to limit privileged account risk, implement least privilege policies, control applications, and demonstrate compliance. Thycotic makes enterprise-level privilege management accessible for everyone by eliminating dependency on overly complex security tools and prioritizing productivity, flexibility and control. Headquartered in Washington, DC, Thycotic operates worldwide with offices in the UK and Australia.


ZeroNorth

ZeroNorth is the first company to deliver risk-based vulnerability orchestration across applications and infrastructure. By orchestrating scanning tools throughout the entire software lifecycle, ZeroNorth provides a comprehensive, continuous view of risk and reduces costs associated with managing disparate technologies. ZeroNorth empowers customers to rapidly scale application and infrastructure security, while integrating seamlessly into developer environments to simplify and verify remediation. For more information, follow ZeroNorth on Twitter (@ZeroNorthSec) or LinkedIn.