Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analytics.

Filter the library by ...

White Paper | Presented by Salt Stack

SaltStack SecOps: Automated, universal IT system compliance and security enforcement

Security and IT operations teams must work together to keep modern data centers compliant and secure, but their efforts are often crippled by disparate toolsets, misaligned workflows, and competing priorities. It’s time for that to change. SaltStack SecOps is a new solution that harnesses SaltStack’s event-driven automation technology to deliver full-service, closed-loop automation for compliance and security. With SaltStack SecOps, security professionals and operations teams can work together to define a compliance policy, scan all systems against it, detect issues, and actively remediate them—all from a single platform.

Case Study | Presented by Salt Stack

IBM Cloud Customer Spotlight

IBM uses SaltStack as a global command and control layer that provides comprehensive audit, remote execution, automation, patch, and security detection and remediation for the IBM Cloud network.

eGuide | Presented by Data Theorem

App and API Security

Security—for your applications and for the APIs that make them understandable. You can’t live without it, especially in these days of rapid development and ever-evolving threats. Our eGuide will give you a quick overview and some ideas for improving your own company’s stance.

Respond to business risks in real-time with integrated risk management

The financial and legal penalties that could result from noncompliance make it imperative to invest in transforming outdated GRC processes.

White Paper | Presented by ServiceNow Inc

8 Simple Steps for Automating Governance, Risk and Compliance (GRC)

From cutting costs to reducing risks and problems, there are many benefits to automating GRC.

eBook | Presented by ServiceNow Inc

Implementing agile security response

Data breaches constantly threaten enterprises today. And the risk continues to grow. According to the 2018 Cost of a Data Breach Study, the cost of breaches rose from $3.62 to $3.86 million, increasing by 6.4% from last year.

eBook | Presented by ServiceNow Inc

Now on Now: Accelerating Security Operations

Learn about why ServiceNow uses Security Operations for security incident response and vulnerability response.

The Total Economic Impact Of ServiceNow Security Operations

Tracking down security event data from multiple sources, figuring out which incidents to prioritize, identifying unforeseen vulnerabilities in your infrastructure, and then resolving these issues is incredibly complex and devours countless man hours.

Fraud, IP Theft and an Intrusion: A Case Study

When you’re faced with an intrusion — whether you were brought in as an outside consultant or are responsible for incident response for your organization — your stakeholders or management ask the same question: What did they take, and how did they get in?

White Paper | Presented by Cylance

Threat Models and Methodologies

This white paper explores what MITRE has achieved in creating the ATT&CK Enterprise framework, and how security practitioners can leverage it to better dissect and assess the security problems at hand.

Load More