Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Security

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







Service Account Security for Dummies eBook

by ThycoticJan 21, 2020

Get control of service account sprawl and develop a strategy to properly protect and secure service account access to lock down your privileged account attack surface. Learn about service account governance and day-to-day best practices, and the key criteria for managing them with automated cyber security tools.


2019 State of Privileged Access Management (PAM) Maturity Report

by ThycoticJan 21, 2020

With up to 80 percent of breaches due to compromised credentials, more organizations than ever before are prioritizing privileged account protection. Thycotic's "State of PAM Maturity" report highlights the disturbing results based on more than 450 responses worldwide to our online PAM Maturity Assessment.

See the three major key takeaways from the survey and recommendations for action in the complete 2019 State of Privileged Access Management (PAM) Maturity Report.
85% are still


Privileged Account Incident Response Template

by ThycoticJan 21, 2020

Thycotic's free Privileged Account Incident Response template is designed to prevent a cyber breach from becoming a cyber catastrophe. It helps IT operations, security and incident response teams form a united front against an attack to coordinate actions and maintain business continuity.


Black Hat 2019 Hacker Survey Report

by ThycoticJan 21, 2020

Both hackers and security pros strongly agree that service accounts are an attractive target because hackers can easily elevate privileges and gain access to sensitive information. Yet one in three security pros say service account passwords are changed only after an incident or never rotated!


eSentire Annual Threat Intelligence Report: 2019 Perspectives and 2020 Predictions

by eSentireJan 15, 2020

Eliminate guesswork and get in-depth insights to navigate the ever-changing cybercrime landscape. This data-laden, incident-rich report delivers insider info on threat actors, their motivations, tactics and targets so you can make better informed security strategy decisions. Key insights include: Decade-old, state-funded espionage campaigns are still actively collecting from unwittingly compromised organizations Organized cybercrime is reaching new heights of social organization and role


Are SAST Tools Glorified Grep?

by Synopsys, IncJan 15, 2020

Even with a strong architecture and design, application code can still harbor vulnerabilities. Developers can make unintentional mistakes. Teams can also take shortcuts to achieve milestones or enhanced functionalities.

Static application security testing (SAST) is a form of white box . testing that discovers such vulnerabilities in an application's code. Using SAST tools to identify bugs early in the development life cycle reduces the time and cost of remediation.

This


Building security into the DevOps life cycle

by Synopsys, IncJan 15, 2020

The primary goal when breaking the build in the CI/CD DevOps life cycle is to treat security issues with the same level of importance as quality and business requirements. If quality or security tests fail, the continuous integration server breaks the build.

When the build breaks, the CI/CD pipeline also breaks. Based on the reason for the broken build, appropriate activities such as architecture risk analysis (ARA), threat modeling, or a manual code review are triggered.


How to Navigate the Intersection of DevOps and Security

by Synopsys, IncJan 15, 2020

As organizations embrace DevOps, developers and operations work closely together to push new software out rapidly, while improving the quality and making customers happy. However, with speed comes risk. How can these teams build security into their new DevOps culture to ensure secure, high-quality software?

This eBook provides actionable insight into: What DevOps is and how security fits in The tools you need to implement DevSecOps How to train your team in the culture of


Developing and Managing an Endpoint Security Strategy for Your Enterprise

by Deep InstinctDec 02, 2019

Wireless devices. Mobile laptops that could be booted up from anywhere. Desktop systems loaded with sensitive information. Smartphones and smart TVs. For the IT security manager, the concept of ?endpoint security? has evolved significantly over the past year or two. How is your enterprise approaching the endpoint security problem? In this webinar, experts offer advice and recommendations on how to build an endpoint security strategy that works across all of the devices that the end user


Cybersecurity Research: 2019 AWS Cloud Security Report

by CloudPassageJan 14, 2020

If your public cloud were compromised tomorrow would you know what to do first? If you don't, you are not alone.

The numerous high-profile data breaches of 2019 have left organizations wondering how their peers are tackling cloud infrastructure security. CloudPassage partnered with Cybersecurity Insiders to survey and gather insights from their 400,000-member community about cybersecurity professionals' concerns, tools and best practices.

Read the AWS Security Report to learn what


SUBTOPICS:

CloudPassage

CloudPassage is the leading provider of public and private cloud server security and creator of Halo, the industry's first security and compliance platform purpose-built for elastic cloud environments. Halo operates across public, private and hybrid clouds. Industry-leading companies like Foursquare, Avatar New York, and Martini Media trust Halo to seamlessly manage their server security configuration, host-based firewalls, intrusion detection and server account auditing from one system. Headquartered in San Francisco, Calif., CloudPassage is backed by Benchmark Capital, Tenaya Capital and other leading investors.

For more information, please visit http://www.CloudPassage.com.


eSentire

eSentire is the largest pure-play Managed Detection and Response (MDR) service provider, keeping organizations safe from constantly evolving cyber-attacks that technology alone cannot prevent. Its 24x7 Security Operations Center (SOC), staffed by elite security analysts, hunts, investigates, and responds in real-time to known and unknown threats before they become business-disrupting events. Protecting more than $6 trillion in corporate assets, eSentire absorbs the complexity of cybersecurity, delivering enterprise-grade protection and the ability to comply with growing regulatory requirements.


Thycotic

Headquarters: Washington DC

Thycotic is the leading provider of cloud-ready privilege management solutions. Thycotic's security tools empower over 10,000 organizations, from small businesses to the Fortune 500, to limit privileged account risk, implement least privilege policies, control applications, and demonstrate compliance. Thycotic makes enterprise-level privilege management accessible for everyone by eliminating dependency on overly complex security tools and prioritizing productivity, flexibility and control. Headquartered in Washington, DC, Thycotic operates worldwide with offices in the UK and Australia.