Resource Library

Network World has assembled a comprehensive reference collection of technical resources to help guide your decision making.

Filter the library by ...

eGuide | Presented by Verizon

Best Practices For Creating The Workplace of The Future

Nothing has accelerated the seismic shift to remote working like the global pandemic of 2020. Few businesses are likely to return to the way things were prior to COVID-19.

eGuide | Presented by InMotion Hosting

Small Business Owner Guide to WordPress

A comprehensive manual for users of all levels to create, connect and grow their WordPress website.

eGuide | Presented by Panorays

10 Critical Issues to Cover in Your Vendor Security Questionnaires

In today’s perilous cyber world, companies must carefully check their vendors’ cyber posture, and the initial vetting of any third party typically begins with a comprehensive security questionnaire.

eGuide | Presented by Panorays

How to Create Scalable Vendor Security Questionnaires

To prevent data breaches through the supply chain, organizations must thoroughly assess and monitor the security of the third parties with which they do business.

eGuide | Presented by Panorays

The CISO’s Guide to Choosing an Automated Security Questionnaire Platform

In this day and age of cyber risk and data privacy regulations, automated third-party questionnaires are a must.

eGuide | Presented by Panorays

The CISO's Guide to Third-Party Security Management

In this comprehensive guide, we provide the guidance you need to make your organization’s third-party security program efficient and scalable.

eGuide | Presented by Micro Focus

Gartner's 2020 Critical Capabilities for Application Security Testing

The Micro Focus Fortify Application Security platform has received the highest score in the 2020 Gartner Critical Capabilities for Application Security Testing report for the Enterprise use case and the Mobile and Client use case. Download the report to learn how the critical capabilities evaluated map to your needs and how vendors scored in each area.

eGuide | Presented by Illusive Networks

Preparedness, Detection and Response Strategies for SolarWinds and Similar Attacks

The scope of the SolarWinds attack has shaken the global cybersecurity community.

How to Migrate from VMware NSX for vSphere to NSX-T

Read this guide for the information you need to accomplish a successful migration, enable simpler operations, and strengthen security for your data center. 

eGuide | Presented by AWS & COGNIZANT

Cognizant Solutions for Healthcare & Life Sciences on AWS

Cognizant has a proven track record of building successful life sciences solutions for customers on the AWS platform.

Load More