Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Thinking Like an Attacker: Strategies for Defense

by DomainToolsJun 03, 2020

More and more, enterprises are discovering that the best way to test and defend their organization is to view their IT environment from the perspective of an attacker. But how do you predict an attacker's motives and simulate their methods, and how do you know that you aren?t overlooking key vulnerabilities? In this Dark Reading webinar, experts discuss methods for testing your security?s mettle by thinking like your adversary.


Salesforce: Optimizing the Agent Experience from Anywhere

by SalesforceJun 03, 2020

Contact centers have had to adjust on the fly to the new realities of the coronavirus pandemic: Many agents now work from home, and are dealing with demands that they never encountered before. Improving your agents? experience is critical to keeping them performing at top levels?which benefits them and your customers. One key way to help your agents is by integrating your CRM more tightly with the agent desktop. That?s now possible with Salesforce?s Service Cloud Voice product, which


Today's Non-Employee Lifecycle Management Without SecZetta

by SecZettaJun 03, 2020

Today, managing the identity lifecycle for non-employees is an arduous and time-consuming process. From onboarding to auditing and verification to the removal of access on termination, the lack of centralized or complete information can leave your organization exposed to risk.

SecZetta provides purpose-built solutions that enable organizations to execute risk-based identity and lifecycle strategies for diverse non-employee populations. Manual processes are replaced with automated

  • SecZetta
  • Risk Management/Security
  • Security Monitoring
  • Details

The Identity Gap in Third-Party Risk Management

by SecZettaJun 03, 2020

Organizations have eagerly embraced growing and diverse populations of partners, vendors, and other contingent labor as well as non-human technologies like service accounts, bots, and smart devices to boost competitiveness. While these efforts are intended to fortify competitive strategies, many organizations are just now realizing the extent to which by utilizing these third parties, they are creating new operational challenges and expanding their attack surface, dramatically increasing cyber

  • SecZetta
  • Risk Management
  • Security Monitoring
  • Details

The Risk Management Blind Spot

by SecZettaJun 03, 2020

An ever-growing area of concentration in risk management is identifying and mitigating the risks that third parties introduce to an organization — and perhaps equally important, ensuring that third parties don't introduce unmeasured risk. One might think that third-party governance systems, sometimes used for vendor assessments, could be used to manage the identity and access management aspects of the vendor relationship. However, most security vendors do not consider identity to be part

  • SecZetta
  • Risk Management
  • Security Monitoring
  • Details

SANS 2019 Threat Hunting Survey Report

by MandiantMay 29, 2020

This 2019 SANS Threat Hunting Survey Report aims to help organizations understand what threat hunting is, why it is essential to protect their organizations, and how novice and experienced hunters can improve their processes.

The report explores the differing: Definitions of threat hunting Methodologies of performing threat hunting Spending priorities and training needs Tools and system data needed for a successful hunt Effectiveness of hunting practices

  • Mandiant
  • Cybersecurity
  • Security Monitoring
  • Details

Case Study: Validating Security & Reducing Risk

by MandiantMay 29, 2020

The case study explores how one of the largest healthcare providers in the U.S. validates security protocols and protects critical assets with an effective security validation program that utilizes automation and an intelligence-driven approach to mitigate risk, optimize controls, and communicate value.

This case study and accompanying video covers: The challenges of cybersecurity for healthcare organizations Measuring and monitoring the efficacy of security tools Reducing cyber risk

  • Mandiant
  • Security Monitoring
  • Risk Management/Security
  • Details

Red Team Realities

by Revolutionary SecurityMay 28, 2020

Red Team is an exciting term, but it can be misconstrued. How do you know when it?s the right fit for your organization? Using real-world anecdotes, this webinar will illustrate how to navigate a decision-making process aligned to use cases and desired outcomes tailored to your organization's needs. Listen as we discuss the different levels of cybersecurity assessments, and help you determine which one is right for your organization (hint: it's in the title).


title

by IBMMay 22, 2020

Virtual eventsare growing in popularity, especially as the world continues to deal with the novel coronavirus. Fortunately, modern technology has made it possible for companies to host amazing online events that rival in-person versions, leading to many benefits for both event planners and attendees alike. In this article, we take a deep dive into what virtual events are and why they're worth your time. Then we share 20 unique ideas you can use to host an amazing virtual event today. For more


Assess your Security Effectiveness

by CyCognitoMay 22, 2020

Conducting an organizational self-assessment of the strengths and weaknesses of your cybersecurity program is a critical process that should be an ongoing activity for every organization.

By establishing a baseline security evaluation of your cybersecurity effectiveness, you can measure your progress over time and implement plans to better align your program to your business priorities. This helps you improve your security program and ensure that investments in people and technology

  • CyCognito
  • Security Management & Analytics
  • Risk Management
  • Details