Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Security

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







Q1 2019 Quarterly Threat Report

by eSentireJun 14, 2019

Read this report to learn what targeted businesses in January, February and March 2019 and to find out what strategies you can implement to protect your organization.


Automating Cybersecurity Functions in Your Enterprise

by SecureWorksApr 30, 2019

Organizations face tremendous challenges when trying to keep pace with the volume of cyber incidents they are seeing today. Information security leaders are looking to the benefits of security orchestration and automation to relieve the strain on their incident response teams. While the promise of orchestration is great, achieving success requires great care in choosing which processes and investigative actions to automate.


Network Traffic Analysis for MITRE ATT&CK

by ExtraHopJun 12, 2019

The MITRE ATT&CK Framework has rapidly become popular among security teams looking to take a structured and proactive approach to improving threat detection.

For many security professionals, using the ATT&CK Framework means taking a close look at each of the hundreds of tactics, techniques, and procedures (TTPs) and trying to figure out which tool in their patchwork of solutions is most likely to detect or block any given threat. MITRE provides an evaluation framework for Endpoint


Understanding Container Adoption With a Special Focus on Container Security

by Aqua Security Software Inc.Jun 12, 2019

This 2019 Container Adoption Survey reveals key trends and drivers of container adoption from over 500 IT pros surveyed.


451 Business Impact Brief: Security for Cloud-Native Compute Will Be Different

by Aqua Security Software Inc.Jun 12, 2019

The impact on security will be significant. This 451 Business Impact Report explains the requirements of cloud native security and why organizations should approach it differently.


The 2019 Trust Report

by SynackJun 11, 2019

In today's world, consumers are demanding trust from the products that they love, and security has become a core piece of providing consistent, positive customer experience.

That's why today, Synack, the trusted crowdsourced security platform, has released the first annual Trust Report, Volume I: Trust Has a Number. In the report, security, brand and policy executives from Home Depot, Intel, CLEAR, Just Eat, and Stanford share how they are defending their brands and building stronger


Santander Case Study

by SynackJun 11, 2019

Learn why Santander Chose Scalable, Crowdsourced Security Testing to Protect their Customer Assets Santander UK needed a more comprehensive and efficient way to protect its changing attack surface. Leveraging the power of Synack's crowdsourced security testing platform, Santander got this and more. "To put it simply, my goal as CISO has always been to make Santander a safer place for our customers to bank." - Dave Sheridan, CISO, UK Santander

Learn how Santander achieved:


Essential Elements of a Penetration Test

by SynackJun 11, 2019

The Essential Elements of a Penetration Test, a guide based on expert analysis and our experience with the largest brands across the G2000, shares what we've learned from protecting >$1 trillion in Fortune 500 revenue.

It is estimated that up to $5.2 trillion in global value is at risk of cybercrime over the next five years. To protect themselves from being hacked and in response to increased compliance and regulations, organizations have traditionally performed penetration testing


Executive's Guide to Integrating SecOps and NetOps

by ExtraHopJun 04, 2019

Given today's increasing IT complexity and scale, it's become imperative to break down the barriers between Security and IT groups and align them--including their tools, processes and skills--around a common goal: delivering a fast and secure user experience while enabling business agility.

For CIOs and CISOs who make these decisions, this is an executive's guide to integrating SOC and NOC teams, highlighting the business and technical benefits of doing so.

Reasons why


How Enterprises Are Using IT Threat Intelligence

by Dark ReadingNov 20, 2018

Concerns over nation-state actors and other security threats are driving enterprises to rethink the way they collect and analyze cybersecurity data. A high percentage of organizations are seeking to augment their internal telemetry with external threat data so they can identify and respond to potential data compromises faster. However, collecting and analyzing threat intelligence is no easy task — early implementers report being slowed by manual data correlation and analysis processes.


SUBTOPICS:

Aqua Security Software Inc.

Headquarters: 800 District Avenue,  Suite 310 Burlington, MA 01803

Aqua Security enables enterprises to secure their container-based and cloud-native applications from development to production, accelerating container adoption and bridging the gap between DevOps and IT security. Aqua's Container Security Platform provides full visibility into container activity, allowing organizations to detect and prevent suspicious activity and attacks, providing transparent, automated security while helping to enforce policy and simplify regulatory compliance.


Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


eSentire

eSentire is the largest pure-play Managed Detection and Response (MDR) service provider, keeping organizations safe from constantly evolving cyber-attacks that technology alone cannot prevent. Its 24x7 Security Operations Center (SOC), staffed by elite security analysts, hunts, investigates, and responds in real-time to known and unknown threats before they become business-disrupting events. Protecting more than $6 trillion in corporate assets, eSentire absorbs the complexity of cybersecurity, delivering enterprise-grade protection and the ability to comply with growing regulatory requirements.


ExtraHop

ExtraHop is the leader in real-time IT analytics. Our platform makes data-driven IT a reality, applying advanced analytics and cloud-based machine learning to all digital interactions to deliver timely and accurate insight. IT leaders turn to ExtraHop first to help them make faster, better-informed decisions that improve performance, security, and digital experience. Just ask the hundreds of global ExtraHop customers, including Sony, Lockheed Martin, Microsoft, Adobe, and Google. To experience the power of ExtraHop, explore our interactive online demo: www.extrahop.com/demo


Synack

Synack, the most trusted crowdsourced security company, delivers comprehensive and continuous penetration testing with actionable results. The company combines the world's most skilled and trusted ethical hackers with AI-enabled technology to create a scalable, effective security solution. Headquartered in Silicon Valley with regional offices around the world, Synack protects leading global banks, federal agencies, DoD classified assets, and close to $1 trillion in Fortune 500 revenue. Synack was founded in 2013 by former US Department of Defense hackers Jay Kaplan, CEO, and Dr. Mark Kuhr, CTO.