Resource Library

Network World has assembled a comprehensive reference collection of technical resources to help guide your decision making.

Filter the library by ...

Definitive Guide to Cyber Risk Analytics

Cyber and the business have not always seen eye-to-eye. Cyber operators have been operating in survival mode for some time. Now, business executives are demanding more alignment and proactive engagement with the organization.

An Expanding Attack Surface: 5 Tips to Manage Third-Party Risk

As organizations become increasingly reliant on third-parties, they expand their attack surface & put themselves at risk.

CIP-013 Is Just the Beginning: Utility Regulations Demand Robust Third-Party Risk Management

Evolving Cybersecurity Concerns in the Utilities Sector Cyber attacks have the potential to create significant physical consequences for utilities, especially as critical infrastructure operations become more integrated.

Going Viral: The Challenges & Urgency of Managing TPRM

Managing cyber risks has become more challenging and urgent as businesses expand their vendor ecosystems.

White Paper | Presented by ReliaQuest

451 Research Report: Tackling the Visibility Gap in Information Security

451 Research recently published insights gathered from in-depth interviews with security leaders across 150 large enterprises to better understand the most critical challenges facing their teams.

White Paper | Presented by ReliaQuest

5 Approaches to a Consistently Evolving Security Program

The difficulty and expense of IT security can place a heavy burden on enterprises and their security teams. But when executed correctly, a consistently evolving security program can help manage costs and drive value beyond cybersecurity by delivering key strategic data analysis and insights to other departments.

White Paper | Presented by ReliaQuest

Application Logging Challenges in Information Security

Logging events from applications is an important process in cybersecurity. Whether it’s a custom-built application, or one hosted by a third-party company, logging and monitoring these applications is necessary to get full visibility into your environment. This type of logging doesn’t come without its share of challenges.

White Paper | Presented by ReliaQuest

Information Security Program Health Monitoring Guide

Building preventive processes that minimize disruption and support tool efficacy. Security program health monitoring is an often-overlooked process that’s critical to maintaining a secure environment. Learn how to address existing vulnerabilities, implement best practices and assess tool efficacy to protect your enterprise.

White Paper | Presented by ReliaQuest

Overly Managed Security: Rethinking the Problem

Over the past ten years, the cybersecurity market has exploded with tools, technologies, platforms, and service providers, who got into the business of security for the same reason most people get into any business: to help solve a problem.

White Paper | Presented by ReliaQuest

The Log Parsing Challenge

Getting ahead of security threats and business trends can set enterprise organizations apart from their competition and enhance customer service.

Load More