Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Strategic CIO

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







4 Reasons to Add UBA to Your SIEM

by SplunkMar 19, 2019

Download your complimentary copy of "4 Reasons to Add UBA to Your SIEM" and discover why adding a machine-learning UBA solution can prove to be an invaluable addition to your SIEM.


7 SIEM Trends to Watch in 2019

by SplunkMar 19, 2019

Since the inception of SIEM technology, SIEM solutions have become more of an information platform, with enterprise demands for better security driving the market. Read "7 SIEM Trends to Watch in 2019" to discover the exciting features on the horizon.


Darktrace Antigena: The Future of AI-Powered Autonomous Response

by DarktraceJun 18, 2019

The current era in cyber security is characterized by three fundamental challenges: the complexity of the enterprise network and connected infrastructure, the speed of newage attacks, and the strain of overwhelmed incident responders.

This white paper will explore the critical challenges that security teams face in this new era of cyber-threat, and how Darktrace Antigena is leveraging AI to autonomously fight back against advanced attacks, giving human responders the critical time


Cyber AI Response: Threat Report 2019

by DarktraceJun 18, 2019

This report details seven case studies of attacks that were intercepted and neutralized by cyber defense AI, including insider threat, ransomware, and IoT attacks.

While all threat scenarios were distinct, some fast-moving and others slow and stealthy, in all cases the subtle indicators of suspicious activity were only detectable using Darktrace AI, which learns what is normal for the business environment and autonomously responds to attacks - before damage is done.


Q1 2019 Quarterly Threat Report

by eSentireJun 14, 2019

Read this report to learn what targeted businesses in January, February and March 2019 and to find out what strategies you can implement to protect your organization.


Building and Managing an IT Security Operations Program

by Dark ReadingMay 03, 2019

As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.

Here's what's inside:

• Building and Managing an IT Security Operations Program
• Here's What Happened When a SOC Embraced Automation
• Solving Security: Repetition or Redundancy?


The Cost of Third-Party Cybersecurity Risk Management

by CyberGRXMay 07, 2019

A recent CyberGRX study finds a large disparity between the importance of third-party cyber risk management (TPCRM) versus how ineffective current practices are throughout all major industries. Findings show that organizations must move to a far more scalable and quantitative method of evaluation to reduce third-party cyber exposure and bring confidence to TPCRM.


A No Hassle Guide to Effective Third-Party Risk Management

by CyberGRXMay 07, 2019

Get your guide to identify risks, reduce costs and scale with CyberGRX. Discover how to prioritize third-party vendors who present the greatest risk to your organization, focus on proactive mitigation with dynamic & measurable data, and gain clear visibility into the full scope of your threat landscape.


Vendor Risk Management Guide: The 3 Fundamentals

by CyberGRXMay 07, 2019

This CyberGRX guide provides high-level instruction regarding the basic components of a complete vendor risk management (VRM) program, including Vendor Classification for a risk-based approach, Prioritized Assessment strategies, and Issue Management to scale for the long term.


The Vulnerable Landscape: Metrics, Insights and Impact for Security Leaders

by eSentireMay 06, 2019

Review the report on the probability of your organization being exploited and how to remediate before your business is disrupted.


SUBTOPICS:

CyberGRX

CyberGRX provides enterprises and their third parties with the most cost-effective and scalable approach to third-party cyber risk management today. Built on the market's first third-party cyber risk Exchange, CyberGRX arms organizations with a dynamic stream of third-party data and advanced analytics helping organizations efficiently manage risk in their partner ecosystems. Based in Denver, CO, CyberGRX was designed with partners including Aetna, Blackstone and MassMutual.


Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


Darktrace

Named 'Best Security Company of the Year' in the Info Security Products Guide 2016, Darktrace is one of the world's leading cyber threat defense companies. Its Enterprise Immune System technology detects and responds to previously unidentified threats, powered by machine learning and mathematics developed by specialists from the University of Cambridge. Without using rules or signatures, Darktrace is uniquely capable of understanding the 'pattern of life' of every device, user and network within an organization, and defends against evolving threats that bypass all other systems. Some of the world's largest corporations rely on Darktrace's self-learning technology in sectors including energy and utilities, financial services, telecommunications, healthcare, manufacturing, retail and transportation. Darktrace is headquartered in Cambridge, UK and San Francisco, with offices in Auckland, Boston, Chicago, Dallas, London, Los Angeles, Milan, Mumbai, New York, Paris, Seoul, Singapore, Sydney, Tokyo, Toronto and Washington D.C.


eSentire

eSentire is the largest pure-play Managed Detection and Response (MDR) service provider, keeping organizations safe from constantly evolving cyber-attacks that technology alone cannot prevent. Its 24x7 Security Operations Center (SOC), staffed by elite security analysts, hunts, investigates, and responds in real-time to known and unknown threats before they become business-disrupting events. Protecting more than $6 trillion in corporate assets, eSentire absorbs the complexity of cybersecurity, delivering enterprise-grade protection and the ability to comply with growing regulatory requirements.


Splunk

Splunk was founded to pursue a disruptive new vision: make machine data accessible, usable and valuable to everyone. Machine data is one of the fastest growing and most pervasive segments of "big data" - generated by websites, applications, servers, networks, mobile devices and the like that organizations rely on every day. By monitoring and analyzing everything from customer clickstreams and transactions to network activity and call records -and more, Splunk turns machine data into valuable insights no matter what business you're in. It's what we call operational intelligence.