Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.



Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...


Case Study: Validating Security & Reducing Risk

by MandiantMay 29, 2020

The case study explores how one of the largest healthcare providers in the U.S. validates security protocols and protects critical assets with an effective security validation program that utilizes automation and an intelligence-driven approach to mitigate risk, optimize controls, and communicate value.

This case study and accompanying video covers: The challenges of cybersecurity for healthcare organizations Measuring and monitoring the efficacy of security tools Reducing cyber risk

Case Study: Continuously Validate Cybersecurity Controls

by MandiantMay 15, 2020

Are you able to get evidence-based data to show progress and improvements in your cybersecurity strategy?

Read this case study to understand how Mandiant Security Validation (formerly Verodin), empowers leading financial services organization Torchmark Corporation to continuously validate cybersecurity controls and realize improvements in key areas such as: People and process conditioning Communicating the effectiveness of security controls Real-time insights into environmental drift

Simplify InfoSec Risk and Compliance

by ReciprocityApr 30, 2020

Managing risk, compliance, and audit processes is complex and resource intensive. Without a centralized platform, audit cycles are longer, visibility into overall risk posture is lacking, and reporting is inefficient. Many companies delay implementing a GRC solution, fearing it to be too costly or challenging--but it doesn't have to be.

Download this whitepaper to learn how you can:
• Automate evidence collection
• Reduce manual effort and shorten audit cycles

Supercharging SIEM Solutions With Threat Intelligence

by Recorded FutureApr 20, 2020

Security information and event management (SIEM) technologies are essential tools for security operations teams to collect, correlate, and analyze security event logs across their network environments.

But every organization's attack surface is growing these days. For SIEM users, that's creating some big challenges, such as an information overload from too many alerts and the need to do additional, painstaking manual research to make up for a lack of context in sources of information

2020 SANS Cyber Threat Intelligence (CTI) Survey

by Recorded FutureApr 20, 2020

Organizations of all sizes are embracing intelligence as a critical security function to expose unknown threats, inform better decisions, and accelerate risk reduction.

This new survey from the SANS Institute explores how cyber threat intelligence has evolved over the last year. Download the results to examine current trends and find out: How to measure your intelligence program's effectiveness Which processes and tools best support collaborative CTI efforts What types of

Security Intelligence: Driving Security From Analytics to Action

by Recorded FutureApr 20, 2020

To drive down risk while achieving meaningful operational outcomes, intelligence must be embedded into the core of every security workflow, function, and decision. This requires a unified approach for collecting, analyzing, and automating data and insights.

At Recorded Future, security intelligence is more than a methodology - it's a mindset, a philosophy for empowering their clients with the intelligence necessary to drive every security initiative and strategic decision.

10 Critical Issues to Cover in Your Vendor Security Questionnaire

by PanoraysApr 17, 2020

Companies must carefully check their vendors' cyber posture, and the initial vetting of any third party usually begins with a comprehensive security questionnaire. What are the key questions that must be addressed to determine if vendors have a strong cyber posture?

Download this guide to learn the most important ones to consider, including: Does customer data leave the vendor's production systems? Does the vendor support single sign-on? Does the vendor have an employee security

A Step-By-Step Guide to Building a Scalable Vendor Onboarding Process

by PanoraysApr 17, 2020

Vendors are at the heart of many companies' processes and activities, but onboarding them has become complicated because of cybersecurity. To prevent data breaches, vendors must demonstrate and maintain a strong cyber posture. Yet effectively checking vendors' cyber posture can be extremely challenging.

Read this guide to learn the steps to a scalable vendor onboarding process, including: Determining criticality of vendors Analyzing the vendor attack surface Creating customized

The Guide to Supplier CCPA Readiness for Security and IT Teams

by PanoraysApr 17, 2020

Businesses that fail to comply with the California Consumer Privacy Act (CCPA) could face stiff penalties. Therefore, IT professionals must understand why it's important for vendors to comply with CCPA, and why those that do not can be an unacceptable risk for companies.

Download this guide to learn information and best practices for supplier CCPA readiness, including: Overview of CCPA To whom CCPA applies Service providers vs. third parties The requirement for cybersecurity Cost

An Insider’s View into a Supply Chain Attack

by PanoraysApr 17, 2020

In early 2019, it was reported that one of the largest information technology outsourcing and consulting firms had suffered a major data breach. A year before, a software company identified potential warning signs of this upcoming data breach.

Download this whitepaper to learn how the software company was able to: Monitor the IT consulting firm prior to the attack Pinpoint numerous cybersecurity issues at the firm Take immediate steps to mitigate risk



Today's business world requires security validation. Without data-driven evidence that validates security effectiveness, companies operate on assumptions and are at risk of an attack. Through automated, continuous monitoring and measurement against real-world attack behaviors, Mandiant Security Validation (formerly Verodin) enables organizations to achieve optimal cybersecurity performance through ongoing assessment, optimization and rationalization.


Panorays automates third-party security lifecycle management.

With the Panorays platform, companies dramatically speed up their third-party security evaluation process and gain continuous visibility while ensuring compliance to regulations such as GDPR, CCPA and NYDFS.

It is the only platform that enables companies to easily view, manage and engage on the security posture of their third parties, vendors, suppliers and business partners.


Founded in 2009, Reciprocity has reimagined bulky legacy GRC software to meet the demands of today's dynamic data-driven ecosystem. The company is recognized for its forward-thinking cloud platform, ZenGRC, that elevates risk, compliance, and audit from a burdensome expense to a strategic advantage. Reciprocity has U.S. headquarters in San Francisco and global offices in Ljubljana, Slovenia, and Argentina.

Recorded Future

Recorded Future arms security teams with the only complete security intelligence solution powered by patented machine learning to lower risk. Our technology automatically collects and analyzes information from an unrivaled breadth of sources and provides invaluable context in real time and packaged for human analysis or integration with security technologies.