Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.



Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...


How Data Breaches affect the Enterprise

by Dark ReadingDec 10, 2019

Despite increased enterprise investments in cybersecurity, 2019 is on track to be the worst year ever for data breaches. A growing number of organizations are experiencing significant financial losses, brand damage, and customer alienation issues as a result of the increased breach activity.

How do these breaches occur? How are businesses responding, and what is the impact of these compromises on the business? This report, one of three to come out of Dark Reading's annual Strategic

How to Combat Nation-State Attacks

by Carbon BlackDec 05, 2019

Nation-state attacks are sophisticated cyberthreats from adversaries working directly or indirectly for their own government. Their motivation? To place their nation in a better position against their political enemies. The targets of nation-state attacks range from private hospitals and financial institutions to election infrastructures, making them one of the largest global security threats today.

To help you understand this threat, what it looks like in your environment, and the

How to Combat Ransomware

by Carbon BlackDec 05, 2019

Ransomware isn't new—in fact, it's over 30 years old. Attacks date back as far as 1989 and have been the most pervasive cyber threat since 2005, with a dramatic spike in recent years. The resulting costs to targeted businesses are soaring. In fact, according to the 2018 Verizon Data Breach Investigations Report, ransomware has moved from the 22nd most common variety of malware in 2014 to the most common variety in 2018.

It is estimated that, by the end of this year, ransomware

Third-Party Cyber Risk Management 101 Guide

by CyberGRXDec 04, 2019

Implementing an efficient, effective third-party cyber risk management (TPCRM) program is essential to securing your organization's cyber ecosystem by tracking, avoiding, and minimizing the risks that your organization is exposed to.

Get your guide to learn:
• What is TPCRM and why does it matter?
• 6 steps to launching a TPCRM program
• How to streamline and strengthen your TPCRM program

Heavy Reading Data Analytics

by Ribbon Communications Inc.Nov 27, 2019

The telecom industry is in the midst of transformation to deliver better customer satisfaction scores, to more quickly deliver new service offers, and to achieve greater cost efficiency. The key to delivering on these transformation goals is data analytics. For example, operators need analytic insights to figure out if their customers are satisfied — and if not, why not? Similarly, to understand what new service offerings operators should launch, they need high quality marketing analytics.

Leverage Existing DLP Investments for Compliance

by SpirionNov 14, 2019

Read this case study to learn how a financial institution integrated Spirion's discovery and classification solution with their existing McAfee DLP to achieve comprehensive PCI compliance

Azure Information Protection: Optimized for Risk Management and Data Loss Prevention

by SpirionNov 14, 2019

Many organizations have the Microsoft Azure Information Protection (AIP) platform but are not able to optimize it. With the discovery of all structured and unstructured sensitive data and 2% false-positive rates, an organization can save both time and money. In this case study, find out how a leading pharmaceutical supplier bridged the gap for a unified solution, protecting all sensitive data.

The Data Torrent

by Dell EMC and AMDNov 13, 2019

Connected devices and the Internet of Things are driving exponential data growth. Over the next few years, the growth will happen at rocket speed. Buried in the rapidly accumulating data are insights that could lead to significant commercial innovation and scientific progress. Download this report to learn more.

Navigating the Deluge of Security Data

by Dark ReadingNov 01, 2019

In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. System logs, security tools, network telemetry, endpoint, and mobile reports may all provide clues that help reveal a cyberattack. We examine some examples of how enterprises can cull this data to find the clues they need.

Here's what's inside: Navigating the Deluge of Security Data Overburdened SOC Analysts Shift Priorities Microsoft Debuts Azure

Cybersecurity is improving, but is it enough?

by eSentireNov 07, 2019

Digital transformation initiatives are pushing many organizations into unfamiliar territory that they are not equipped to protect. This primary 451 Research paper, commissioned by eSentire, examines advancements organizations have made in improving their cybersecurity posture, ongoing challenges to protect and secure the company's digital assets and how they are better positioning their organizations to contend with a dynamic and expanding cyberthreat landscape.
This research examines:


Carbon Black

Carbon Black has designed the most complete next-gen endpoint-security platform, enabling organizations to stop the most attacks, see every threat, close security gaps, and evolve their defenses. The Cb Endpoint Security Platform helps organizations of all sizes replace legacy antivirus technology, lock down systems, and arm incident response teams with advanced tools to proactively hunt down threats. Today, Carbon Black has approximately 2,000 worldwide customers, including 25 of the Fortune 100 and more than 600 employees. Carbon Black was voted Best Endpoint Protection by security professionals in the SANS Institute's Best of 2015 Awards.


CyberGRX provides enterprises and their third parties with the most cost-effective and scalable approach to third-party cyber risk management today. Built on the market's first third-party cyber risk Exchange, CyberGRX arms organizations with a dynamic stream of third-party data and advanced analytics helping organizations efficiently manage risk in their partner ecosystems. Based in Denver, CO, CyberGRX was designed with partners including Aetna, Blackstone and MassMutual.

Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.

Dell EMC and AMD

As a member of the Dell Technologies unique family of businesses, Dell EMC serves a key role in delivering the essential infrastructure for organizations to build their digital future, transform IT, and protect their most important asset -- information. Dell EMC enables IT and digital business transformation through trusted big data solutions, built on a modern data center infrastructure that incorporates industry-leading technologies.


eSentire is the largest pure-play Managed Detection and Response (MDR) service provider, keeping organizations safe from constantly evolving cyber-attacks that technology alone cannot prevent. Its 24x7 Security Operations Center (SOC), staffed by elite security analysts, hunts, investigates, and responds in real-time to known and unknown threats before they become business-disrupting events. Protecting more than $6 trillion in corporate assets, eSentire absorbs the complexity of cybersecurity, delivering enterprise-grade protection and the ability to comply with growing regulatory requirements.

Ribbon Communications Inc.

Ribbon Communications Inc. (Nasdaq: RBBN) delivers market-leading software solutions that secure and power many of the world's leading service provider and enterprise communications environments. Built on world-class technology and intellectual property, the company's cloud-native solutions deliver intelligent and secure real-time communications solutions for the cloud, network and enterprise edge. Ribbon's Kandy Cloud real-time communications software platform delivers advanced and embedded CPaaS and UCaaS capabilities enabling service providers to rapidly create and deploy high-value communications services. With locations in more than 25 countries and on six continents, Ribbon's innovative, market-leading portfolio empowers service providers and enterprises with carrier-grade real-time communications solution, along with a new level of security that runs in their network infrastructure, data centers and private cloud, or in the public cloud.


Spirion is a pioneer in the critical first step of data security and compliance -- intelligent data discovery and classification. This step positions organizations to achieve unparalleled protection of sensitive data in today's ever-changing regulatory landscape -- and proactively minimizes the risks, costs, and reputational damage of cyberattacks.