Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Banking

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







Winning at Cyber Risk Management

by CovailSep 28, 2020

Discover how real operational risk prioritization can make the process more efficient and effective.

Download the eBook to learn: Learn how to manage vulnerabilities effectively. Gain insights on Vulnerability Best Practices. Discover the ways your company might be vulnerable to risk.


Vulnerability Management for Financial Companies

by CovailSep 29, 2020

Financial industries are a consistent target for cyberattacks and held to a higher security standard because of their management of sensitive information. It is possible to comply with regulations and stay one step ahead of internal and external bad actors. Download this use case to see how.


2020 Insider Data Breach Survey

by EgressSep 23, 2020

97% of CISOs are worried about insider data breaches. And, with unreliable employees their primary 'alert system' and patchy technology deployments to mitigate this risk, it's no wonder why.

Download this report now to learn:

• Why the insider threat is the biggest risk in every organization
• The frequency of accidental and intentional data breaches
• How seniority affects data ownership and ethics


Key Steps in Satisfying Your CCPA and Other Privacy Obligations

by EgressSep 23, 2020

60% of organizations aren't ready for CCPA. Is yours?

The California Consumer Privacy Act (CCPA) went into effect on January 1, 2020 with full enforcement in July, 2020. CCPA also includes a "12-month look back" requirement, which covers information collected about a consumer since January 1, 2019.

Download this guide to email compliance to learn:
• Why is the CCPA important?
• What is the current state of readiness among organizations across North America


Human Layer Security for Dummies

by EgressSep 22, 2020

People put data at risk every day - often without intending to. Why does this happen? What can you do to prevent these incidents? Download your free copy of Human Layer Security for Dummies to discover:

• The psychology and behaviors behind insider data breaches
• The six profiles most likely to put your organization's data at risk
• How a new category of technology - human layer security - can help
• Why contextual machine learning can mitigate


The 2020 Outbound Email Security Report

by EgressSep 22, 2020

From replying to spear phishing attacks, to BCC errors and wrong recipients, outbound email is the number one security threat your organization faces. This report shows the reality of this risk, its impact and the solution you need to be aware of. Download now to:

• Recognize the risks and understand how employees cause email data breaches
• See how often incidents occur that put your organization at risk
• Find out more about the repercussions of email


How IT Security Organizations are Attacking the Cybersecurity Problem

by Dark ReadingSep 11, 2020

In 2019, enterprises encountered a wide range of new exploits and threats, as well as new challenges associated with online privacy issues and regulations. How will these organizations be investing their cybersecurity budgets and staffing in the next 12 months? What tools and best practices do they consider most important, and which emerging technologies are they implementing? This report, one of three to come out of Dark Reading's annual Strategic Security Survey, offers insight on how security


Using Compliance Budgets to Build a Red Team Capability

by RandoriSep 02, 2020

Leading Advice from Enterprise Management Associates

Companies of every size face an age-old problem: too much to do with too little money. For security leaders, this has always been true: every company wants to be more secure, but there never seems to be enough resources to make it a reality. This report from EMA Analyst Christopher Steffen details how security can compliance can together to improve security through the build out of a red team capability.In the report, EMA outlines


Focus on the Vulnerabilities that Pose the Greatest Risk

by TenableAug 31, 2020

Too many vulnerabilities to manage? Try a new approach

Security teams are dealing with more vulnerabilities than they can handle. Spreading these limited -- and valuable -- resources too thin can quickly lead to inefficiency and job burnout. The last thing you need is to waste precious time remediating vulnerabilities that pose little to no risk.

With risk-based vulnerability management, you can automate the prioritization process. You'll know exactly which vulnerabilities


Forrester: The Rise of the Business-Aligned Security Executive

by TenableAug 31, 2020

How Secure Are We?

Only the business-aligned cybersecurity leader can answer with confidence

Business leaders want a clear picture of their organization's cybersecurity posture -- "How secure, or at risk, are we?" -- but many security leaders struggle to answer that question, let alone accurately communicate this information. Tenable commissioned Forrester Consulting to conduct a global independent study to find out why -- and what you can do about it.


SUBTOPICS:

Covail

Covail™ is a trusted solutions partner, enabling organizations to optimize through Intelligent Operations solutions that lower total risk and cost for key business functions, equipping them to transform from a position of strength.


Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


Egress

Egress' vision is for a connected world in which people communicate efficiently and securely. To achieve this, we wrap a protective layer around individual users to stop human-activated data breaches before they happen. Our patented technologies are built using leading-edge contextual machine learning and powerful encryption that mitigate modern risks in ways that other solutions simply can't achieve.

Today, we provide intelligent email security to prevent accidental and intentional breaches, protect sensitive data, and equip CISOs and their teams with the detailed reporting required for compliance purposes.


Randori

Randori is building the world's most authentic, automated attack platform to help defenders train like the adversary. Based on technology used to penetrate some of the world's largest and most secure organizations, Randori enables security leaders to regain control of their attack surface, prioritize like an attacker, and practice how they fight.


Tenable

Tenable Network Security provides continuous network monitoring to identify vulnerabilities, reduce risk and ensure compliance. Tenable Network Security's family of products includes SecurityCenter Continuous View and Nessus.