Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Banking

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







5 Reasons You Need Near Real-Time Threat Data

by NeustarMar 18, 2020

If you don't think you need near real-time threat data to help protect your organization, download this infographic to learn 5 reasons why you're wrong. "Near real-time" data is critical because today's data is worth less tomorrow than it is today.


Darktrace Antigena: The Future of AI-Powered Autonomous Response

by DarktraceJun 18, 2019

With over 7,000 deployments across 105 countries worldwide, Darktrace's cyber AI platform has delivered the first proven, enterprise-grade autonomous response technology on the market: Darktrace Antigena. Like a digital antibody, the technology works by learning the normal 'pattern of life' for every user and device in the business and taking surgical action to contain in-progress threats in real time, before they have time to escalate into a crisis. This white paper will explore the


AI-Augmented Attacks and the Battle of the Algorithms

by DarktraceMar 16, 2020

In discussions around the future of AI and cyber-threats, we often wonder when we can expect to see malicious or offensive AI attacks in the wild. While we have not yet seen conclusive evidence of execution, this report will show that all the tools and open-source research needed to facilitate an AI-augmented attack exist today. Therefore, we can anticipate that AI-driven cyber-attacks are not years away, but a very real possibility in the immediate future.

This report will document an


Cyber AI: An Immune System for Email

by DarktraceMar 16, 2020

Email and collaboration platforms represent the connective tissue of any digital business. Information is shared, plans are hatched, and alliances are formed in the digital realm of written correspondence. Yet as a human-driven medium, email will always be fueled by a pervasive assumption of trust that stands as the 'weakest link' in an organization's security strategy.

Peter Firstbrook, VP Analyst at Gartner, summarizes the market dynamic well: "Common controls, such as standard,


Linking, Orchestrating, and Managing Your Enterprise Security Systems

by ReliaQuest LLCJan 06, 2020

Over the years, most enterprises have purchased and installed a wide variety of security tools and technologies, from security gateways to firewalls to malware detection systems. Individually, they all solve a problem - but they often can't work together or speak a common language. In this webinar, experts will discuss methods and technologies for linking and integrating disparate security systems to provide a more comprehensive view of security threats - and a more structured data defense.


Ransomware Defense for Dummies - 2nd Edition

by Cisco UmbrellaJan 31, 2020

Updated for 2020, the 2nd edition of Cisco Umbrella's popular Ransomware Defense for Dummies eBook explores the top cyber security best practices to reduce ransomware risks.

Ransomware Defense for Dummies consists of 5 short chapters that explore:

• How it operates and its defining characteristics
• Cyber security best practices to reduce risk
• A new best-of-breed network security architecture
• The Cisco Ransomware Defense solution
• Important


The Role of Predictive Intelligence in the Fight Against Cyberattacks

by Cisco UmbrellaJan 31, 2020

Traditional threat intelligence is reactive, basing security on information gathered only after an attack is successfully carried out. With threats increasing in sophistication and speed, you need intelligence that can learn from internet activity patterns, automatically identify attacker infrastructure being staged for the next threat, and block those threats before they have the chance to attack your organization. Download this white paper to learn how a predictive intelligence can aid in the


How Enterprises Are Developing and Maintaining Secure Applications

by Dark ReadingJan 30, 2020

One of the most common ways cybercriminals breach enterprises is by finding security vulnerabilities in the applications they use. Yet, with the skyrocketing speed of application development, many enterprises still struggle to build security into their software and eliminate dangerous flaws that might lead to data breaches. And most have experienced such severe security troubles with one application that they've simply migrated to a different one altogether.

In this 2020 Dark Reading


Service Account Security for Dummies eBook

by ThycoticJan 21, 2020

Get control of service account sprawl and develop a strategy to properly protect and secure service account access to lock down your privileged account attack surface. Learn about service account governance and day-to-day best practices, and the key criteria for managing them with automated cyber security tools.


2019 State of Privileged Access Management (PAM) Maturity Report

by ThycoticJan 21, 2020

With up to 80 percent of breaches due to compromised credentials, more organizations than ever before are prioritizing privileged account protection. Thycotic's "State of PAM Maturity" report highlights the disturbing results based on more than 450 responses worldwide to our online PAM Maturity Assessment.

See the three major key takeaways from the survey and recommendations for action in the complete 2019 State of Privileged Access Management (PAM) Maturity Report.
85% are still


SUBTOPICS:

Cisco Umbrella

Avoid the aftermath with a before strategy. Cisco Umbrella is a cloud security platform that provides the first line of defense against threats on the internet wherever users go.


Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


Darktrace

Darktrace is the world's leading cyber AI company and the creator of Autonomous Response technology. Its self-learning AI is modeled on the human immune system and used by over 3,000 organizations to protect against threats to the cloud, email, IoT, networks and industrial systems.

The company has over 1,000 employees and headquarters in San Francisco and Cambridge, UK. Every 3 seconds, Darktrace AI fights back against a cyber-threat, preventing it from causing damage.


Neustar

Neustar is an information services and technology company and a leader in identity resolution providing the data and technology that enables trusted connections between companies and people at the moments that matter most. Neustar offers industry-leading solutions in Marketing, Risk, Communications, Security and Registry that responsibly connect data on people, devices and locations, continuously corroborated through billions of transactions. Neustar serves more than 8,000 clients worldwide, including 60 of the Fortune 100. Learn how your company can benefit from the power of trusted connections here: https://www.home.neustar.


Thycotic

Headquarters: Washington DC

Thycotic is the leading provider of cloud-ready privilege management solutions. Thycotic's security tools empower over 10,000 organizations, from small businesses to the Fortune 500, to limit privileged account risk, implement least privilege policies, control applications, and demonstrate compliance. Thycotic makes enterprise-level privilege management accessible for everyone by eliminating dependency on overly complex security tools and prioritizing productivity, flexibility and control. Headquartered in Washington, DC, Thycotic operates worldwide with offices in the UK and Australia.