Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Security

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







How to Prevent 81% of Phishing Attacks from Sailing Right into Your Inbox with DMARC

by KnowBe4, Inc.Oct 24, 2019

Only ~20% of companies use DMARC, SPF, and DKIM, global anti-domain-spoofing standards, which could significantly cut down on phishing attacks. But even when they are enabled and your domain is more secure, 81% of phishing attacks still continue to sail right through to the end-user. In this webinar, Roger Grimes, KnowBe4?s Data-Driven Defense Evangelist, will teach you how to enable DMARC, SPF, DKIM the right way! Then, learn the six reasons why phishing still might get through to your inbox


Splunk Security Predictions 2020

by SplunkDec 10, 2019

In IT Security, we're lucky to stay one step ahead of the bad guys. To give you a half-step more advantage, a panel of Splunk IT security experts has assembled a fresh look at emerging threats - and one major emerging solution.


How to Perform Security Investigations in AWS

by Amazon Web ServicesDec 10, 2019

Learn how to plan for a cloud-based security investigation, perform prerequisites, and select services and controls. Know what data sources to leverage when investigating and containing an incident in the cloud, how to determine source and timeline, targeted systems, origination point and more.


Simplify Your Application Security

by WhiteHat SecurityDec 06, 2019

Aimed at helping you simplify your company's application security; this whitepaper offers recommendations to combat some of the most common application security issues experienced by organizations today.


Guide to Building Your Vendor Risk Management Program

by SecurityScorecardDec 05, 2019

Tackling the problem of vendor risk is not made any easier with technology solutions being added by the day. Current vendor risk management processes are not equipped to handle the growing demand ofsecurity risk assessmentsfor new and existing third-parties. Download the guide to learn how you can improve yourvendor risk management programto handle the modern risk that lies ahead.


Case Study: Modulr

by SecurityScorecardDec 05, 2019

By using SecurityScorecard, Modulr Finance was also able to decrease operational costs, increase objectivity, reduce human error and more. Read the case study.


Case Study: Horizon Media

by SecurityScorecardDec 05, 2019

Learn how Horizon Media used SecurityScorecard to make strategic changes to their IT infrastructure and increase cybersecurity hygiene. Read more.


Assessing Exposure and Organizational Behavior to the BlueKeep Vulnerability

by SecurityScorecardDec 05, 2019

SecurityScorecard researchers used the BlueKeep event as a way to study organizations' response to this vulnerability over time. Read the report.


Gartner's Top 10 Security Projects for 2019 Report

by SecurityScorecardDec 05, 2019

Get your copy of Gartner's Top 10 Security Projects for 2019 report to find out which projects you should implement or improve upon in 2019. Learn more.


How to Combat Nation-State Attacks

by Carbon BlackDec 05, 2019

Nation-state attacks are sophisticated cyberthreats from adversaries working directly or indirectly for their own government. Their motivation? To place their nation in a better position against their political enemies. The targets of nation-state attacks range from private hospitals and financial institutions to election infrastructures, making them one of the largest global security threats today.

To help you understand this threat, what it looks like in your environment, and the


SUBTOPICS:

Amazon Web Services

Amazon Web Service (AWS) is a subsidiary of Amazon that provides on-demand cloud computing platforms to individuals, companies and governments, on a metered pay-as-you-go basis. In aggregate, these cloud computing web services provide a set of simple, abstract technical infrastructure and distributed computing building blocks and tools.

AWS comprises more than 90 services spanning a wide range including computing, storage, networking, database, analytics, application services, deployment, management, mobile, developer tools, and tools for the Internet of Things. The most popular include Amazon Elastic Computer Cloud (EC2) and Amazon Simple Storage Service (Amazon S3). Most services are not exposed directly to end users, but instead offer functionality through APIs for developers to use in their applications. Amazon Web Services' offerings are accessed over HTTP, using the REST architectural style and SOAP protocol.


Carbon Black

Carbon Black has designed the most complete next-gen endpoint-security platform, enabling organizations to stop the most attacks, see every threat, close security gaps, and evolve their defenses. The Cb Endpoint Security Platform helps organizations of all sizes replace legacy antivirus technology, lock down systems, and arm incident response teams with advanced tools to proactively hunt down threats. Today, Carbon Black has approximately 2,000 worldwide customers, including 25 of the Fortune 100 and more than 600 employees. Carbon Black was voted Best Endpoint Protection by security professionals in the SANS Institute's Best of 2015 Awards.


SecurityScorecard

SecurityScorecard is a cybersecurity ratings platform that helps enterprises gain operational command of their security posture and the security posture of their ecosystems through continuous, non-intrusive monitoring. The company's approach to security focuses on identifying vulnerabilities from an outside-in perspective, the same way a hacker would.

Common use cases include:
• Vendor Risk Management
• Compliance Monitoring
• Self Monitoring
• Threat Intelligence
• Cyber Insurance Underwriting


Splunk

Splunk was founded to pursue a disruptive new vision: make machine data accessible, usable and valuable to everyone. Machine data is one of the fastest growing and most pervasive segments of "big data" - generated by websites, applications, servers, networks, mobile devices and the like that organizations rely on every day. By monitoring and analyzing everything from customer clickstreams and transactions to network activity and call records -and more, Splunk turns machine data into valuable insights no matter what business you're in. It's what we call operational intelligence.


WhiteHat Security

WhiteHat Security has been in the business of securing web applications for 17 years. Combining advanced technology with the expertise of its global Threat Research Center (TRC) team, WhiteHat delivers application security solutions that reduce risk, reduce cost and accelerate the deployment of secure applications and web sites. The company's flagship product, WhiteHat Sentinel, is a software-as-a-service platform providing dynamic application security testing (DAST), static application security testing (SAST), and mobile application security assessments. The company is headquartered in San Jose, Calif., with regional offices across the U.S. and Europe.