Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Strategic CIO

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







IT 2020: A Look Ahead

by Informa TechJan 08, 2020

Are you ready for the critical changes that will occur in 2020? We've compiled editor insights from the best of our network (Dark Reading, Data Center Knowledge, InformationWeek, ITPro Today and Network Computing) to deliver to you a look at the trends, technologies, and threats that are emerging in the coming year.

Inside: IT 2020: A Look Ahead 15 Technology Predictions for 2020 8 Impactful Enterprise Technologies in 2020 The Most Important Agile Trends to Follow in 2020


Orchestrate Risk and Vulnerability Management Across the Software Development Life Cycle

by ZeroNorthJan 03, 2020

ESG Solution Showcase: Orchestrating Risk and Vulnerability Management across the Software Development Life Cycle (SDLC), from Code Commit through Build to Deployment

With the continuing complexity of application and infrastructure testing, there is a need for a single orchestration platform that can simplify the process of managing scanning tools and technologies. Analyst firm ESG outlines application and infrastructure challenges facing security leaders and how they are addressing them.


Make Application and Infrastructure Vulnerability Management More Effective

by ZeroNorthJan 03, 2020

While 50% of vulnerabilities are typically remediated within 90-days after discovery (and 25% within 30-days). identifying and fixing basic vulnerabilities in software and infrastructure can seem like a never-ending task of constant vigilance. Learn the five steps you can take right now to optimize your processes and begin maturing the management of your application and infrastructure vulnerability program.


The Essential Guide to Risk-Based Vulnerability Orchestration Across the Software Development Lifecycle

by ZeroNorthJan 03, 2020

Stop treading water and simplify the management and remediation of your software vulnerabilities. This eBook discusses challenges with current approaches, the differences between automation and orchestration and the steps to get started with orchestration.


Three Steps to Securing Enterprise Data on Cloud Platforms

by ReliaQuestAug 14, 2018

Cloud Platforms like Amazon Web Services, Microsoft Azure, and Google Cloud Platform have introduced a new level of flexibility and scalability, but they have also introduced new challenges when it comes to threat monitoring which can leave enterprises vulnerable to attack.

The secret to success starts with understanding the common platform risks inherent in cloud technologies. From threat protection to GDPR compliance, security teams have a lot to consider when configuring their


Top 5 Log Sources You Should Be Ingesting but Probably Aren’t

by ReliaQuestOct 18, 2018

The key to minimizing security threats and maximizing business insights is logging and monitoring all relevant events from across an enterprise IT environment-but some data sources present unique logging challenges, often leaving them unmonitored and vulnerable to attack.

Top 5 Logging Sources You Should Be Ingesting but Probably Aren't offers advice for assessing and improving current logging activities, plus tips for logging of commonly overlooked sources, such as:

• Cloud


XDR: Enterprise-Scale Detection and Response

by Palo Alto NetworksDec 13, 2019

What is XDR? Get the answers in this E-book

XDR replaces legacy siloed tools to provide visibility and analytics across your entire infrastructure. See how XDR supercharges detection, investigation and response capabilities to solve security operations challenges.

Download XDR: Enterprise-Scale Detection and Response to understand the:

• Challenges with the current state of detection and response
• Definition and key requirements of XDR
• Tactical use


Implementing Agile Security Response

by ServiceNowDec 12, 2019

Data breaches constantly threaten enterprises today. And the risk continues to grow. According to the 2018 Cost of a Data Breach Study, the cost of breaches rose from $3.62 to $3.86 million, increasing by 6.4% from last year.

Coordinating incident response across the organization is the biggest challenge for most enterprises. Defining and tracking performance metrics can be extremely difficult. And all too often, manual processes force highly trained employees to focus on low-level


8 Simple Steps for Automating Governance, Risk and Compliance

by ServiceNowDec 12, 2019

From cutting costs to reducing risks and problems, there are many benefits to automating governance, risk and compliance (GRC). But what are the simplest ways to maximize value and minimize cost during implementation?

Check out 8 simple steps for automating GRC and learn how to create a GRC roadmap that:

• Scales with your business
• Reduces compliance costs and resource requirements
• Improves operational efficiency
• Provides continuous monitoring


The Year in Security: 2019

by Dark ReadingDec 02, 2019

A look at the biggest news stories (so far) of 2019. This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse.

Here's what's inside: The Year in Security:


SUBTOPICS:

Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


Informa Tech

Headquarters: 5 Howick Place, London, SW1P 1WG

Informa Tech is a market leading B-to-B information provider with depth and specialism in the Information and Communications (ICT) Technology sector. Our purpose is to inspire the technology community to design, build and run a better digital world... and we do this by informing, educating and connecting those communities via our research, digital media, events and training products and services.


Palo Alto Networks

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world's greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organizations across cloud, networks, and mobile devices. Our vision is a world where each day is safer and more secure than the one before.


ReliaQuest

SECURITY IS ALL WE DO. From our earliest days, we've been laser-focused on delivering operational excellence in cybersecurity. No managed services engagements. No consulting models. No value-added products or services. Just a commitment to help Make Security Possible for enterprise leaders looking to unlock the true potential in their data.


ServiceNow

ServiceNow (NYSE: NOW) is making the world of work, work better for people. Our cloud based platform and solutions deliver digital experiences that create great experiences and unlock productivity for employees and the enterprise.


ZeroNorth

ZeroNorth is the first company to deliver risk-based vulnerability orchestration across applications and infrastructure. By orchestrating scanning tools throughout the entire software lifecycle, ZeroNorth provides a comprehensive, continuous view of risk and reduces costs associated with managing disparate technologies. ZeroNorth empowers customers to rapidly scale application and infrastructure security, while integrating seamlessly into developer environments to simplify and verify remediation. For more information, follow ZeroNorth on Twitter (@ZeroNorthSec) or LinkedIn.