Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.



Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...


The CISO’s Guide to Choosing an Automated Security Questionnaire Platform

by PanoraysApr 17, 2020

Organizations can no longer hire vendors without proof of a strong cyber posture, and a thorough questionnaire can demonstrate that vendors' internal security policies are up to par. Yet the benefits of automated questionnaires can vary, depending on the solution. What features should CISOs be sure are included in their security questionnaires?

Download this guide to learn the top six, including: Scalability Context-based questions Customization

Accelerate Cyber Response with DNS Insights

by NeustarApr 14, 2020

Don't think you need threat data? Read this report to learn why you do.

This Impact Brief identifies methods in which domain name service (DNS) data can be used by cybersecurity professionals, recent developments that have enhanced the usability of passive DNS, and a case study that shows how one organization uses accelerated DNS-based feeds to improve cyber defenses.

Qualys Readies its Next-Gen Vulnerability Management Offering

by Qualys Inc.Apr 10, 2020

VMDR is a game-changing cloud app that is the foundation of an effective risk-based Vulnerability Management Program

This report acknowledges Qualys VMDR (Vulnerability Management, Detection and Response) for addressing fundamental challenges organizations face in discovering, triaging and remediating critical vulnerabilities in the network. Ovum reports that VMDR provides an end-to-end, seamless and integrated cybersecurity workflow with built-in patching. With VMDR, organizations not

What are the Business Costs of Heeding or Ignoring GDPR?

by SpirionApr 08, 2020

Since EU supervisory authorities began GDPR enforcement in May of 2018, over 200 companies and government agencies have been punished for privacy and security failures by EU authorities. Those companies include both marquee and non-household brands where close to £400M in proposed fines were issued.

Download this whitepaper to learn more on:

• Non-compliance penalties
• The 3 largest GDPR fines by January 2020
• Rewards of complying with

New U.S. State Data Protection Laws Enforceable in 2020

by SpirionApr 08, 2020

The legislative sessions for U.S. states in 2019 produced an unprecedented number of new or updated data protection statutes and regulations. Common mandates address areas such as the definition of personal data, breach requirements, and the implementation of controls. This document provides a concise summary of data protection laws enforceable in 2020.

Stronger as One: The Case for Collective Defense

by IronNet CybersecurityApr 08, 2020

A steady increase in collaboration and capabilities among threat actors has put companies in a position where they can no longer work alone on cyber defense.

In this eBook, you will learn: The concept of Collective Defense and how it delivers the benefits of behavioral detection at scale across an industry sector. How Collective Defense is revolutionizing how companies of all sizes are approaching cyber defense. What a proactive approach to cyber defense means for your

Third-Party Cyber Defense: A New Level of Control & Visibility by Tracking the Adversary

by PrevailionApr 01, 2020

Most of today's businesses are beholden to a fundamental weakness—lack of visibility. As businesses grow larger, their vast third-party vulnerabilities unfurl themselves, exposing the business to huge risks they aren't even aware of and can't control.

Prevailion proposes a new paradigm for security. Instead of living cloistered within a defensive apparatus, surrounded by expensive endpoint solutions, we propose an offensive tactic - tracking the threat actors' every moves.

Osterman Research-Nation-State Attack Survey: Top CISO Concerns

by AnomaliMar 27, 2020

The Situation Between the United States and Iran is Influencing CISO's Security Strategy and Operations.

Nation-state attacks--in which military of non-military government entities seek to infiltrate other governments, enterprises, or non-commercial organizations--are on the rise. For example, Microsoft revealed in mid-2019 that 8,000 of its enterprise customers had been targeted by these types of attacks during the previous twelve months.

Nation-state attacks are

Gartner Report: Top Security and Risk Management Trends

by Palo Alto NetworksMar 24, 2020

See the security trends Gartner believes are ripe for disruption and get their recommendation on how to improve your organization's resilience and defenses.

Download Gartner's new report, "Top Security and Risk Management Trends" to learn why:

• XDR was named one of the top 9 cybersecurity trends
• Security process automation is the key to eliminating repetitive tasks
• AI will create new security responsibilities for protecting digital business initiatives

Cyber Threats and Trends Report: 2019 Year in Review

by NeustarMar 18, 2020

The number of DDoS attacks increased three times over last year. Are you prepared?

Download this report to understand the latest trends in DDoS attacks and what you need to do, today, to keep your organization safe.



Anomali detects adversaries and tells you who they are. Organizations rely on the Anomali Threat Platform to detect threats, understand the adversary, and respond effectively. Anomali arms security teams with machine learning optimized threat intelligence and identifies hidden threats targeting their environments. Anomali enables organizations to collaborate and share threat information among trusted communities and is the most widely adopted platform for ISACs worldwide.

For more information, visit our website below and follow us on Twitter @Anomali

IronNet Cybersecurity

Since IronNet was founded in 2014, our mission has been to deliver the power of collective cybersecurity to defend companies, sectors, and nations so that people, companies, and nations can live and work with peace of mind in cyberspace. Today, organizations around the world turn to IronNet to detect known and unknown cyber threats targets in their networks and share that information with peers so that all members can collectively defend against that threat.


Neustar is an information services and technology company and a leader in identity resolution providing the data and technology that enables trusted connections between companies and people at the moments that matter most. Neustar offers industry-leading solutions in Marketing, Risk, Communications, Security and Registry that responsibly connect data on people, devices and locations, continuously corroborated through billions of transactions. Neustar serves more than 8,000 clients worldwide, including 60 of the Fortune 100. Learn how your company can benefit from the power of trusted connections here:

Palo Alto Networks

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world's greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organizations across cloud, networks, and mobile devices. Our vision is a world where each day is safer and more secure than the one before.


Panorays automates third-party security lifecycle management.

With the Panorays platform, companies dramatically speed up their third-party security evaluation process and gain continuous visibility while ensuring compliance to regulations such as GDPR, CCPA and NYDFS.

It is the only platform that enables companies to easily view, manage and engage on the security posture of their third parties, vendors, suppliers and business partners.


Prevailion helps organizations reduce cyber risk by providing clear, real-time, and continuous visibility into compromises affecting their entire ecosystem, giving them a competitive edge and empowering them to make strategic business decisions about how, when and with whom to share access to their networks.

Qualys Inc.

Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud-based security and compliance solutions with over 15,700 customers and active users in more than 130 countries, including a majority of each of the Forbes Global 100 and Fortune 100. Qualys helps organizations streamline and consolidate their security and compliance solutions in a single platform and build security into digital transformation initiatives for greater agility, better business outcomes and substantial cost savings. The Qualys Cloud Platform and its integrated Cloud Apps deliver businesses critical security intelligence continuously, enabling them to automate the full spectrum of auditing, compliance and protection for IT systems and web applications on premises, on endpoints and elastic clouds. Founded in 1999 as one of the first SaaS security companies, Qualys has established strategic partnerships with leading managed service providers and consulting organizations including Accenture, BT, Cognizant Technology Solutions, Deutsche Telekom, DXC Technology, Fujitsu, HCL Technologies, IBM, Infosys, NTT, Optiv, SecureWorks, Tata Communications, Verizon and Wipro. The company is also a founding member of the Cloud Security Alliance. For more information, please visit


Spirion is a pioneer in the critical first step of data security and compliance -- intelligent data discovery and classification. This step positions organizations to achieve unparalleled protection of sensitive data in today's ever-changing regulatory landscape -- and proactively minimizes the risks, costs, and reputational damage of cyberattacks.