Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Insurance

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







How to Perform Security Investigations in AWS

by Amazon Web ServicesDec 10, 2019

Learn how to plan for a cloud-based security investigation, perform prerequisites, and select services and controls. Know what data sources to leverage when investigating and containing an incident in the cloud, how to determine source and timeline, targeted systems, origination point and more.


Guide to Building Your Vendor Risk Management Program

by SecurityScorecardDec 05, 2019

Tackling the problem of vendor risk is not made any easier with technology solutions being added by the day. Current vendor risk management processes are not equipped to handle the growing demand ofsecurity risk assessmentsfor new and existing third-parties. Download the guide to learn how you can improve yourvendor risk management programto handle the modern risk that lies ahead.


Case Study: Modulr

by SecurityScorecardDec 05, 2019

By using SecurityScorecard, Modulr Finance was also able to decrease operational costs, increase objectivity, reduce human error and more. Read the case study.


Case Study: Horizon Media

by SecurityScorecardDec 05, 2019

Learn how Horizon Media used SecurityScorecard to make strategic changes to their IT infrastructure and increase cybersecurity hygiene. Read more.


Assessing Exposure and Organizational Behavior to the BlueKeep Vulnerability

by SecurityScorecardDec 05, 2019

SecurityScorecard researchers used the BlueKeep event as a way to study organizations' response to this vulnerability over time. Read the report.


Gartner's Top 10 Security Projects for 2019 Report

by SecurityScorecardDec 05, 2019

Get your copy of Gartner's Top 10 Security Projects for 2019 report to find out which projects you should implement or improve upon in 2019. Learn more.


Third-Party Cyber Risk Management 101 Guide

by CyberGRXDec 04, 2019

Implementing an efficient, effective third-party cyber risk management (TPCRM) program is essential to securing your organization's cyber ecosystem by tracking, avoiding, and minimizing the risks that your organization is exposed to.

Get your guide to learn:
• What is TPCRM and why does it matter?
• 6 steps to launching a TPCRM program
• How to streamline and strengthen your TPCRM program


Data Protection Laws of 2019

by SpirionNov 14, 2019

A great deal of effort was spent this year educating the business and private sector about the 2020 California Consumer Privacy Act (CCPA). However, are you familiar with the 18 other consumer-centric data protection laws that went into effect in 2019? Find out about their nuances like breach notification and data protection requirements in this infographic on US data protection laws.


2019 State of the Internet / Security: Phishing - Baiting the Hook

by AkamaiOct 30, 2019

Phishing isn't a new phenomenon. Since the early days of the Internet, nefarious actors have been impersonating people and businesses in order to first gain your trust, and then your personal information. Now that the Internet is more prevalent in our lives, attackers are getting savvier, making their phishing attacks more sophisticated so that we still fall for them - no matter how aware we are.

Phishing attacks require two things: a lure and a landing. Download this installment of the


Assessing Cybersecurity Risk in Today's Enterprise

by Dark ReadingOct 29, 2019

Security leaders are struggling to understand their organizations' risk exposure. While many are confident in their security strategies and processes, they're also more concerned than ever about getting breached.

Dark Reading's annual 2019 Strategic Security survey reveals that many companies are uncertain about their data breach exposure because of growing threat sophistication, increasing attack volumes, and many other factors. A high percentage of IT leaders see employees as presenting


SUBTOPICS:

Akamai

Akamai is the leading cloud platform for helping enterprises provide secure, high-performing user experiences on any device, anywhere. At the core of the Company's solutions is the Akamai Intelligent Platform providing extensive reach, coupled with unmatched reliability, security, visibility and expertise. Akamai removes the complexities of connecting the increasingly mobile world, supporting 24/7 consumer demand, and enabling enterprises to securely leverage the cloud.

To learn more about how Akamai is accelerating the pace of innovation in a hyperconnected world, please visit www.akamai.com or blogs.akamai.com, and follow @Akamai on Twitter.


Amazon Web Services

Amazon Web Service (AWS) is a subsidiary of Amazon that provides on-demand cloud computing platforms to individuals, companies and governments, on a metered pay-as-you-go basis. In aggregate, these cloud computing web services provide a set of simple, abstract technical infrastructure and distributed computing building blocks and tools.

AWS comprises more than 90 services spanning a wide range including computing, storage, networking, database, analytics, application services, deployment, management, mobile, developer tools, and tools for the Internet of Things. The most popular include Amazon Elastic Computer Cloud (EC2) and Amazon Simple Storage Service (Amazon S3). Most services are not exposed directly to end users, but instead offer functionality through APIs for developers to use in their applications. Amazon Web Services' offerings are accessed over HTTP, using the REST architectural style and SOAP protocol.


CyberGRX

CyberGRX provides enterprises and their third parties with the most cost-effective and scalable approach to third-party cyber risk management today. Built on the market's first third-party cyber risk Exchange, CyberGRX arms organizations with a dynamic stream of third-party data and advanced analytics helping organizations efficiently manage risk in their partner ecosystems. Based in Denver, CO, CyberGRX was designed with partners including Aetna, Blackstone and MassMutual.


Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


SecurityScorecard

SecurityScorecard is a cybersecurity ratings platform that helps enterprises gain operational command of their security posture and the security posture of their ecosystems through continuous, non-intrusive monitoring. The company's approach to security focuses on identifying vulnerabilities from an outside-in perspective, the same way a hacker would.

Common use cases include:
• Vendor Risk Management
• Compliance Monitoring
• Self Monitoring
• Threat Intelligence
• Cyber Insurance Underwriting


Spirion

Spirion is a pioneer in the critical first step of data security and compliance -- intelligent data discovery and classification. This step positions organizations to achieve unparalleled protection of sensitive data in today's ever-changing regulatory landscape -- and proactively minimizes the risks, costs, and reputational damage of cyberattacks.