Cybersecurity Resource Library

The #1 source for free Cybersecurity reports, whitepapers, webinars, research and more.

Showing results 1 - 30 of 929
Showing results 1 - 30 of 929

Filter by

Filters

Boston Beer Company Transforms OT Security & Reduces Costs

Boston Beer Company Transforms OT Security & Reduces Costs

The Boston Beer Company has successfully modernized its infrastructure focusing on reducing risks and enhancing control with the help of the Dragos Platform and OT Watch. This transformation has resulted in 100% ROI in its first year of implementation.

Boston Beer Company Transforms OT Security & Reduces Costs

The Boston Beer Company has successfully modernized its infrastructure focusing on reducing risks and enhancing control with the help of the Dragos Platform and OT Watch. This transformation has resulted in 100% ROI in its first year of implementation.
Dragos, Inc.
OT Cybersecurity Glossary & Quick Start Guide

OT Cybersecurity Glossary & Quick Start Guide

This guide is for IT security veterans who have a great understanding of well-worn cybersecurity concepts, principles, and lingo. We will not waste anyone's time explaining what a firewall is or what exploitation means.

OT Cybersecurity Glossary & Quick Start Guide

This guide is for IT security veterans who have a great understanding of well-worn cybersecurity concepts, principles, and lingo. We will not waste anyone's time explaining what a firewall is or what exploitation means.
Dragos, Inc.
OT Threat Intelligence Report: Fuxnet ICS Malware

OT Threat Intelligence Report: Fuxnet ICS Malware

Get the latest cyber threat intelligence from Dragos WorldView with reporting on the alleged Fuxnet malware attack that targeted Moscow’s municipal infrastructure.

OT Threat Intelligence Report: Fuxnet ICS Malware

Get the latest cyber threat intelligence from Dragos WorldView with reporting on the alleged Fuxnet malware attack that targeted Moscow’s municipal infrastructure.
Dragos, Inc.
Threat Hunting in the Cloud: Adapting to the New Landscape

Threat Hunting in the Cloud: Adapting to the New Landscape

This is an executive summary of the "Threat Hunting in the Cloud: Adapting to the New Landscape" webinar that took place on June 6th, 2024. The speakers were Immanuel Chavoya, Founder and CEO of Risk Horizon, and Kevin Kirkwood, Deputy CISO at LogRhythm. The webinar was moderated by Becky Bracken, editor at Dark Reading.

Threat Hunting in the Cloud: Adapting to the New Landscape

This is an executive summary of the "Threat Hunting in the Cloud: Adapting to the New Landscape" webinar that took place on June 6th, 2024. The speakers were Immanuel Chavoya, Founder and CEO of Risk Horizon, and Kevin Kirkwood, Deputy CISO at LogRhythm. The webinar was moderated by Becky Bracken, editor at Dark Reading.
LogRhythm
Threat Hunting's Evolution:From On-Premises to the Cloud

Threat Hunting's Evolution:From On-Premises to the Cloud

Attackers are constantly trying to break into enterprise environments. It’s the threat hunter’s job to find them before they do damage. This report discusses how threat evolution has evolved, from when on-premises systems were the norm to now, with cloud-based infrastructure. See what the experts have to say about the challenges threat hunters face and what enterprises must do to build and maintain a successful threat-hunting program.

Threat Hunting's Evolution:From On-Premises to the Cloud

Attackers are constantly trying to break into enterprise environments. It’s the threat hunter’s job to find them before they do damage. This report discusses how threat evolution has evolved, from when on-premises systems were the norm to now, with cloud-based infrastructure. See what the experts have to say about the challenges threat hunters face and what enterprises must do to build and maintain a successful threat-hunting program.
LogRhythm
Continuous Asset Discovery Do and Don'ts

Continuous Asset Discovery Do and Don'ts

Know Your Assets, Secure Your Future: Continuous Asset Discovery for Unmatched Cyber Resilience

Continuous Asset Discovery Do and Don'ts

Know Your Assets, Secure Your Future: Continuous Asset Discovery for Unmatched Cyber Resilience
Hadrian
Enhancing DNS Security: Implementing Encrypted DNS to Meet CISA Guidelines

Enhancing DNS Security: Implementing Encrypted DNS to Meet CISA Guidelines

Thursday, July 18, 2024 at 1:00pm EDT

Enhancing DNS Security: Implementing Encrypted DNS to Meet CISA Guidelines

Thursday, July 18, 2024 at 1:00pm EDT
Infoblox
The Three-Point Action Plan for new CISOs

The Three-Point Action Plan for new CISOs

Secure Foundations: Elevating Your Cyber Defense with Hadrian's Three-Point Action Plan

The Three-Point Action Plan for new CISOs

Secure Foundations: Elevating Your Cyber Defense with Hadrian's Three-Point Action Plan
Hadrian
Data Protection Essentials: Proactive PII Leak Prevention and Data Mapping for GDPR

Data Protection Essentials: Proactive PII Leak Prevention and Data Mapping for GDPR

Join the former CISO of UiPath, Okta, Splunk, and SoFi to learn proactive approaches for preventing PII leaks and automating data mapping for compliance. Remediating PII leaks in production is costly and disruptive, while GDPR compliance often relies on manual spreadsheets and surveys. This session covers controls to minimize PII leak risks and streamline data mapping for compliance, featuring a new AI-powered code scanner that stops PII leaks at the code level and automates the creation of RoPA

Data Protection Essentials: Proactive PII Leak Prevention and Data Mapping for GDPR

Join the former CISO of UiPath, Okta, Splunk, and SoFi to learn proactive approaches for preventing PII leaks and automating data mapping for compliance. Remediating PII leaks in production is costly and disruptive, while GDPR compliance often relies on manual spreadsheets and surveys. This session covers controls to minimize PII leak risks and streamline data mapping for compliance, featuring a new AI-powered code scanner that stops PII leaks at the code level and automates the creation of RoPA
HoundDog.ai
Decode the New SEC Cybersecurity Disclosure Ruling

Decode the New SEC Cybersecurity Disclosure Ruling

In a recent AuditBoard and Ascend2 survey, 81% of security professionals and executives said the new SEC cybersecurity disclosure ruling will substantially impact their business. Learn how companies are responding and the steps they’re taking to prepare in Decode the New Cybersecurity Disclosure Ruling.

Decode the New SEC Cybersecurity Disclosure Ruling

In a recent AuditBoard and Ascend2 survey, 81% of security professionals and executives said the new SEC cybersecurity disclosure ruling will substantially impact their business. Learn how companies are responding and the steps they’re taking to prepare in Decode the New Cybersecurity Disclosure Ruling.
AuditBoard
IT Risk & Compliance Platforms: A Buyer's Guide

IT Risk & Compliance Platforms: A Buyer's Guide

This new buyer's guide from CyberRisk Alliance, sponsored by AuditBoard, "IT Risk & Compliance Platforms: A Buyer’s Guide" examines how purpose-built IT Risk and Compliance management software can make your organization more secure and better equipped to respond to new threats and regulatory changes. Download the full guide for actionable insights on how to choose and implement an IT Risk and Compliance platform.

IT Risk & Compliance Platforms: A Buyer's Guide

This new buyer's guide from CyberRisk Alliance, sponsored by AuditBoard, "IT Risk & Compliance Platforms: A Buyer’s Guide" examines how purpose-built IT Risk and Compliance management software can make your organization more secure and better equipped to respond to new threats and regulatory changes. Download the full guide for actionable insights on how to choose and implement an IT Risk and Compliance platform.
AuditBoard
The Future of Audit, Risk, and Compliance: Exploring AI's Transformative Impact, Use Cases, and Risks

The Future of Audit, Risk, and Compliance: Exploring AI's Transformative Impact, Use Cases, and Risks

Artificial intelligence (AI) will play a critical role in helping teams build more resilient organizations while getting more done with less effort. This guide examines how delivering these outcomes requires more than simply normalizing and integrating data, processes, and workflows. It demands connecting data across functions, uncovering trends as they happen, and proactively surfacing actionable issues, risks, and insights.

The Future of Audit, Risk, and Compliance: Exploring AI's Transformative Impact, Use Cases, and Risks

Artificial intelligence (AI) will play a critical role in helping teams build more resilient organizations while getting more done with less effort. This guide examines how delivering these outcomes requires more than simply normalizing and integrating data, processes, and workflows. It demands connecting data across functions, uncovering trends as they happen, and proactively surfacing actionable issues, risks, and insights.
AuditBoard
Tracking the Untrackable: Taking a Proactive Approach to Emerging Risks

Tracking the Untrackable: Taking a Proactive Approach to Emerging Risks

Tracking the Untrackable: Taking a Proactive Approach to Emerging Risk demystifies the approaches to managing key InfoSec risk trends including cloud concentration risk and mass generative AI-related risks. This ebook explains how risk teams can overcome them through the use of connected risk technology.

Tracking the Untrackable: Taking a Proactive Approach to Emerging Risks

Tracking the Untrackable: Taking a Proactive Approach to Emerging Risk demystifies the approaches to managing key InfoSec risk trends including cloud concentration risk and mass generative AI-related risks. This ebook explains how risk teams can overcome them through the use of connected risk technology.
AuditBoard
Brand Threats Masterclass: Experts Reveal Top Attacks and Defense Tactics for 2024

Brand Threats Masterclass: Experts Reveal Top Attacks and Defense Tactics for 2024

Brand experts reveal how impersonation attacks manifest and what organizations can do to better protect against them.

Brand Threats Masterclass: Experts Reveal Top Attacks and Defense Tactics for 2024

Brand experts reveal how impersonation attacks manifest and what organizations can do to better protect against them.
Fortra
Disrupt Counterfeit Threats: A Digital Risk Protection Playbook

Disrupt Counterfeit Threats: A Digital Risk Protection Playbook

Learn how to combat online counterfeit threats that redirect sales, compromise data, and diminish brand reputation.

Disrupt Counterfeit Threats: A Digital Risk Protection Playbook

Learn how to combat online counterfeit threats that redirect sales, compromise data, and diminish brand reputation.
Fortra
Navigating Social Media Threats: A Digital Risk Protection Playbook

Navigating Social Media Threats: A Digital Risk Protection Playbook

The social media threat landscape is rapidly evolving. Learn how to identify and mitigate industry-specific threats.

Navigating Social Media Threats: A Digital Risk Protection Playbook

The social media threat landscape is rapidly evolving. Learn how to identify and mitigate industry-specific threats.
Fortra
Preventing Domain Impersonation: How to Stop Look-Alike Domains and Spoofing

Preventing Domain Impersonation: How to Stop Look-Alike Domains and Spoofing

Cybercriminals spoof domains for lucrative gains. This whitepaper examines how to protect your domains from impersonation.

Preventing Domain Impersonation: How to Stop Look-Alike Domains and Spoofing

Cybercriminals spoof domains for lucrative gains. This whitepaper examines how to protect your domains from impersonation.
Fortra
All the Ways the Internet is Surveilling You

All the Ways the Internet is Surveilling You

Thursday, July 25, 2024 at 1 PM EST

All the Ways the Internet is Surveilling You

Thursday, July 25, 2024 at 1 PM EST
Knowbe4
Next Generation Supply Chain Security

Next Generation Supply Chain Security

Thursday, July 11, 2024 at 1 PM EDT | Brought to you by Snyk

Next Generation Supply Chain Security

Thursday, July 11, 2024 at 1 PM EDT | Brought to you by Snyk
Snyk
Mind the Cyber Resilience Gap

Mind the Cyber Resilience Gap

View On-Demand

Mind the Cyber Resilience Gap

View On-Demand
Commvault
Protecting the Crown Jewels: Source Code Security

Protecting the Crown Jewels: Source Code Security

Wednesday, July 17, 2024 at 1 PM EDT | Brought to you by Mend.io

Protecting the Crown Jewels: Source Code Security

Wednesday, July 17, 2024 at 1 PM EDT | Brought to you by Mend.io
Mend.io
State of Enterprise Cloud Security

State of Enterprise Cloud Security

Rising cloud adoption trends have put organizations on high alert for a wide range of associated security issues.

State of Enterprise Cloud Security

Rising cloud adoption trends have put organizations on high alert for a wide range of associated security issues.
Google Cloud
2024 LevelBlue Futures™ Report: Cyber Resilience

2024 LevelBlue Futures™ Report: Cyber Resilience

Unveil Tomorrow's Security Today! Dive into the 2024 LevelBlue Futures™ Report: Cyber Resilience. Discover the secrets to strengthening your digital fortress against evolving threats. Don't just survive, thrive in the cyber age. Get your exclusive copy now!

2024 LevelBlue Futures™ Report: Cyber Resilience

Unveil Tomorrow's Security Today! Dive into the 2024 LevelBlue Futures™ Report: Cyber Resilience. Discover the secrets to strengthening your digital fortress against evolving threats. Don't just survive, thrive in the cyber age. Get your exclusive copy now!
LevelBlue
LevelBlue Futures™ 2024 Report: Cyber Resilience

LevelBlue Futures™ 2024 Report: Cyber Resilience

Unveil Tomorrow's Security Today! Dive into the 2024 LevelBlue Futures™ Report: Cyber Resilience. Discover the secrets to strengthening your digital fortress against evolving threats. Don't just survive, thrive in the cyber age. Get your exclusive copy now!

LevelBlue Futures™ 2024 Report: Cyber Resilience

Unveil Tomorrow's Security Today! Dive into the 2024 LevelBlue Futures™ Report: Cyber Resilience. Discover the secrets to strengthening your digital fortress against evolving threats. Don't just survive, thrive in the cyber age. Get your exclusive copy now!
LevelBlue
Google Cloud Security Foundations for Dummies

Google Cloud Security Foundations for Dummies

The complete guide to protect everything you build and run on Google Cloud

Google Cloud Security Foundations for Dummies

The complete guide to protect everything you build and run on Google Cloud
Wiz
The Ultimate Guide for Evaluating Cloud Security Solutions

The Ultimate Guide for Evaluating Cloud Security Solutions

Everything you need to know when evaluating cloud security solutions

The Ultimate Guide for Evaluating Cloud Security Solutions

Everything you need to know when evaluating cloud security solutions
Wiz
Empowering Developers, Automating Security: The Future of AppSec

Empowering Developers, Automating Security: The Future of AppSec

Thursday, June 27, 2024 at 1 PM EDT | Brought to you by Snyk

Empowering Developers, Automating Security: The Future of AppSec

Thursday, June 27, 2024 at 1 PM EDT | Brought to you by Snyk
Snyk
A Year in Review of Zero-Days Exploited In-the-Wild in 2023

A Year in Review of Zero-Days Exploited In-the-Wild in 2023

Google observed 97 zero-day vulnerabilities exploited in-the-wild in 2023, over 50 percent more than 2022 (62 vulnerabilities). This report shares the combined analysis of Google’s Threat Analysis Group (TAG) and Mandiant and includes: trends, gaps, lessons learned, and successes across the year as a whole.

A Year in Review of Zero-Days Exploited In-the-Wild in 2023

Google observed 97 zero-day vulnerabilities exploited in-the-wild in 2023, over 50 percent more than 2022 (62 vulnerabilities). This report shares the combined analysis of Google’s Threat Analysis Group (TAG) and Mandiant and includes: trends, gaps, lessons learned, and successes across the year as a whole.
Google Cloud Security
Google Cloud Threat Horizons Report, H1 2024

Google Cloud Threat Horizons Report, H1 2024

Get insights and recommendations from cybersecurity experts in the latest edition of our Google Cloud Threat Horizons Report. Learn how you can defend your organization against emerging threats and stay ahead of threat actors’ evolving tactics.

Google Cloud Threat Horizons Report, H1 2024

Get insights and recommendations from cybersecurity experts in the latest edition of our Google Cloud Threat Horizons Report. Learn how you can defend your organization against emerging threats and stay ahead of threat actors’ evolving tactics.
Google Cloud Security
Google Threat Intelligence

Google Threat Intelligence

Google Threat Intelligence has unmatched visibility into threats enabling us to deliver detailed and timely threat intelligence to security teams around the world. With a diverse set of intelligence sources, Google is able to provide unmatched breadth and depth to this visibility.

Google Threat Intelligence

Google Threat Intelligence has unmatched visibility into threats enabling us to deliver detailed and timely threat intelligence to security teams around the world. With a diverse set of intelligence sources, Google is able to provide unmatched breadth and depth to this visibility.
Google Cloud Security
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.