Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

2020 IT Salary Report | How Do You Compare to Your Peers?

by Informa TechJan 16, 2020

Now is the time for you to create a new plan by evaluating what you earn, what you are worth, and where you want to grow. Download this report to help evaluate your value and worth in the IT professional job market for 2020.

InformationWeek surveyed full-time staff and management IT professionals employed in the United States with questions related to salaries, benefits, certifications, skills, and job satisfaction. The economy is strong, and U.S. IT professionals are reaping the

  • Professional Development and Salary Data
  • IT Strategy
  • Informa Tech
  • Details

Beyond Video Conferencing: Should You Record Every Meeting?

by PanoptoJan 15, 2020

The rapid growth in video conferencing creates a new set of opportunities and potential needs for the enterprise?from making meeting content searchable to satisfying potential new compliance requirements. In this webinar, we?ll explore why enterprises should consider making meeting recordings a standard part of the employee collaboration and communication experience.

  • Video Conferencing / Telepresence
  • Details

eSentire Annual Threat Intelligence Report: 2019 Perspectives and 2020 Predictions

by eSentireJan 15, 2020

Eliminate guesswork and get in-depth insights to navigate the ever-changing cybercrime landscape. This data-laden, incident-rich report delivers insider info on threat actors, their motivations, tactics and targets so you can make better informed security strategy decisions. Key insights include: Decade-old, state-funded espionage campaigns are still actively collecting from unwittingly compromised organizations Organized cybercrime is reaching new heights of social organization and role

  • eSentire
  • Cybersecurity
  • Cloud Security
  • Security Monitoring
  • Risk Management/Security
  • Details

Are SAST Tools Glorified Grep?

by Synopsys, IncJan 15, 2020

Even with a strong architecture and design, application code can still harbor vulnerabilities. Developers can make unintentional mistakes. Teams can also take shortcuts to achieve milestones or enhanced functionalities.

Static application security testing (SAST) is a form of white box . testing that discovers such vulnerabilities in an application's code. Using SAST tools to identify bugs early in the development life cycle reduces the time and cost of remediation.

This

  • Risk Management/Security
  • Risk Management
  • Details

Building security into the DevOps life cycle

by Synopsys, IncJan 15, 2020

The primary goal when breaking the build in the CI/CD DevOps life cycle is to treat security issues with the same level of importance as quality and business requirements. If quality or security tests fail, the continuous integration server breaks the build.

When the build breaks, the CI/CD pipeline also breaks. Based on the reason for the broken build, appropriate activities such as architecture risk analysis (ARA), threat modeling, or a manual code review are triggered.

  • Risk Management/Security
  • Risk Management
  • Details

Developing and Managing an Endpoint Security Strategy for Your Enterprise

by Deep InstinctJan 14, 2020

Wireless devices. Mobile laptops that could be booted up from anywhere. Desktop systems loaded with sensitive information. Smartphones and smart TVs. For the IT security manager, the concept of ?endpoint security? has evolved significantly over the past year or two. How is your enterprise approaching the endpoint security problem? In this webinar, experts offer advice and recommendations on how to build an endpoint security strategy that works across all of the devices that the end user

  • Endpoint Security
  • Chief Information Security Officer (CISO)
  • Security Management
  • Details

Cybersecurity Research: 2019 AWS Cloud Security Report

by CloudPassageJan 14, 2020

If your public cloud were compromised tomorrow would you know what to do first? If you don't, you are not alone.

The numerous high-profile data breaches of 2019 have left organizations wondering how their peers are tackling cloud infrastructure security. CloudPassage partnered with Cybersecurity Insiders to survey and gather insights from their 400,000-member community about cybersecurity professionals' concerns, tools and best practices.

Read the AWS Security Report to learn what

  • CloudPassage
  • Cloud Security
  • Cybersecurity
  • Details

2020 TAG Cyber Security Annual

by CloudPassageJan 14, 2020

The 2020 Security Annual is part of an annual series from TAG Cyber that is published each September since 2016. The massive report offers expert guidance, analysis, and education on fifty different aspects of the cybersecurity ecosystem.

The report includes 50 different aspects of cybersecurity management that are deemed to be essential to any modern information risk reduction program by TAG Cyber. If you are considering a purchase in some area of cybersecurity protection, then this

  • CloudPassage
  • Cybersecurity
  • Cloud Security
  • Details

Securing Real-Time Communications for Dummies Book

by Ribbon Communications Inc.Jan 13, 2020

Unified Communications maybe an open door to your network, you need an session border controller to protect what firewalls cannot do. Firewalls are designed to protect data networks and services from external threats and attacks, but unfortunately, they do a poor job of protecting enterprise communication services. Learn more why the right solution requires an session border controller (SBC) and how Ribbon's SBCs will protect an enterprise VoIP and UC services.

  • Ribbon Communications Inc.
  • Mobile security
  • Risk Management
  • Details

Firewalls vs SBCs

by Ribbon Communications Inc.Jan 13, 2020

Many believe firewalls are sufficient perimeter security but that is incorrect when it comes to protecting your enterprise VoIP services. Learn more why the right solution requires an session border controller (SBC) and how Ribbon's SBCs will protect an enterprise VoIP services.

  • Ribbon Communications Inc.
  • Cybersecurity
  • Mobile security
  • Details