Cybersecurity Resource Library

The #1 source for free Cybersecurity reports, whitepapers, webinars, research and more.

Showing results 1 - 30 of 999
Showing results 1 - 30 of 999

Filter by

Filters

Taking the Uncertainty Out of Cyber Recovery for Nutanix AHV Environments

Taking the Uncertainty Out of Cyber Recovery for Nutanix AHV Environments

Available On-Demand

Taking the Uncertainty Out of Cyber Recovery for Nutanix AHV Environments

Available On-Demand
Rubrik
A CISO's Guide to Geopolitics and CyberSecurity

A CISO's Guide to Geopolitics and CyberSecurity

Geopolitical strain has escalated into cyberwarefare. CISOs need to know how to not only respond to such attacks, but prevent them.

A CISO's Guide to Geopolitics and CyberSecurity

Geopolitical strain has escalated into cyberwarefare. CISOs need to know how to not only respond to such attacks, but prevent them.
ExtraHop
Evolve Your Ransomware Defense

Evolve Your Ransomware Defense

Outsmart Ransomware: Discover How RevealX's Full Network Visibility Can Slash Detection Times and Boost Your ROI by 193%

Evolve Your Ransomware Defense

Outsmart Ransomware: Discover How RevealX's Full Network Visibility Can Slash Detection Times and Boost Your ROI by 193%
ExtraHop
RevealX Catches Ransomware Within Days of Deployment at Wood County Hospital

RevealX Catches Ransomware Within Days of Deployment at Wood County Hospital

The landscape of ransomware attacks is rapidly evolving. Learn how ExtraHop Reveal X was able to detect and thwart an attack for Wood County Hospital, just days after launch.

RevealX Catches Ransomware Within Days of Deployment at Wood County Hospital

The landscape of ransomware attacks is rapidly evolving. Learn how ExtraHop Reveal X was able to detect and thwart an attack for Wood County Hospital, just days after launch.
ExtraHop
The Anatomy of a Ransomware Attack

The Anatomy of a Ransomware Attack

Unpacking a Ransomware Attack, Minute by Minute. If you could detect every inflection point of a ransomware attack as it unfolded in real time, what would you do differently?

The Anatomy of a Ransomware Attack

Unpacking a Ransomware Attack, Minute by Minute. If you could detect every inflection point of a ransomware attack as it unfolded in real time, what would you do differently?
ExtraHop
The ROI of RevealX Against Ransomware

The ROI of RevealX Against Ransomware

With ransomware incidents increasing by 50% in 2023, you need crucial detection that existing security tools miss. See how RevealX addresses gaps in traditional security measures, providing faster threat detection and resolution.

The ROI of RevealX Against Ransomware

With ransomware incidents increasing by 50% in 2023, you need crucial detection that existing security tools miss. See how RevealX addresses gaps in traditional security measures, providing faster threat detection and resolution.
ExtraHop
Defense in Depth: Not Deep Enough

Defense in Depth: Not Deep Enough

Thursday, December 19, 2024 at 1 PM EDT

Defense in Depth: Not Deep Enough

Thursday, December 19, 2024 at 1 PM EDT
Rubrik
The Dirt on ROT Data

The Dirt on ROT Data

Wednesday, December 18, 2024 at 1 PM EDT

The Dirt on ROT Data

Wednesday, December 18, 2024 at 1 PM EDT
Rubrik
Delivering Business Value Through a Well-Governed Digital Identity Program

Delivering Business Value Through a Well-Governed Digital Identity Program

Discover how Identity and Access Management (IAM) drives business value with an attribute-based approach. This white paper outlines a framework for identity governance, offering best practices and guidance to enhance security, simplify access, ensure compliance and deliver measurable results.

Delivering Business Value Through a Well-Governed Digital Identity Program

Discover how Identity and Access Management (IAM) drives business value with an attribute-based approach. This white paper outlines a framework for identity governance, offering best practices and guidance to enhance security, simplify access, ensure compliance and deliver measurable results.
GuidePoint Security
Navigating IAM In A Cloud Based World: Strategies and Technologies for Success

Navigating IAM In A Cloud Based World: Strategies and Technologies for Success

Navigate evolving cybersecurity threats with practical insights on cloud security and IAM synergies to protect your digital assets.

Navigating IAM In A Cloud Based World: Strategies and Technologies for Success

Navigate evolving cybersecurity threats with practical insights on cloud security and IAM synergies to protect your digital assets.
GuidePoint Security
Infographic: Emerging Best Practice for Proactive Security Solutions

Infographic: Emerging Best Practice for Proactive Security Solutions

Research shows that organizations are now investing in proactive security over preventative and reactive approaches, in the shift towards more pre-emptive attack surface exposure management.

Infographic: Emerging Best Practice for Proactive Security Solutions

Research shows that organizations are now investing in proactive security over preventative and reactive approaches, in the shift towards more pre-emptive attack surface exposure management.
Titania
Measuring Success: How to Build Cybersecurity Program Metrics from the Ground Up

Measuring Success: How to Build Cybersecurity Program Metrics from the Ground Up

In today's evolving cybersecurity landscape, effectively communicating metrics to both technical and non-technical audiences is crucial. As cyber threats become more sophisticated, cybersecurity has shifted from a "don’t let it interfere" mindset to a strategic priority, with CISOs under pressure to prove program effectiveness and optimize costs.

Measuring Success: How to Build Cybersecurity Program Metrics from the Ground Up

In today's evolving cybersecurity landscape, effectively communicating metrics to both technical and non-technical audiences is crucial. As cyber threats become more sophisticated, cybersecurity has shifted from a "don’t let it interfere" mindset to a strategic priority, with CISOs under pressure to prove program effectiveness and optimize costs.
Axonius
Research in Emerging Best Practice in the Use of Proactive Security Solutions

Research in Emerging Best Practice in the Use of Proactive Security Solutions

Research reveals over 70% of businesses have increased spending on proactive security, outpacing preventative and reactive measures.

Research in Emerging Best Practice in the Use of Proactive Security Solutions

Research reveals over 70% of businesses have increased spending on proactive security, outpacing preventative and reactive measures.
Titania
The State of Cyber Resilience: Why IT and security leaders are bolstering cyber resilience as complexity increases

The State of Cyber Resilience: Why IT and security leaders are bolstering cyber resilience as complexity increases

The IT and security industry is rapidly evolving due to digital transformation, changing work environments, and increasing cyber threats, creating more complexity for teams. To adapt, IT and security leaders are focusing on strengthening cyber resilience to protect against external threats and address internal challenges such as staffing and resource constraints.

The State of Cyber Resilience: Why IT and security leaders are bolstering cyber resilience as complexity increases

The IT and security industry is rapidly evolving due to digital transformation, changing work environments, and increasing cyber threats, creating more complexity for teams. To adapt, IT and security leaders are focusing on strengthening cyber resilience to protect against external threats and address internal challenges such as staffing and resource constraints.
Axonius
The Current State of AI Adoption in Cybersecurity, Including its Opportunities

The Current State of AI Adoption in Cybersecurity, Including its Opportunities

Thursday, December 12, 2024 at 1 PM EST

The Current State of AI Adoption in Cybersecurity, Including its Opportunities

Thursday, December 12, 2024 at 1 PM EST
Trend Micro
Full Content Inspection: The New Standard in Network Security and Why It's Necessary

Full Content Inspection: The New Standard in Network Security and Why It's Necessary

Full Content Inspection (FCI) is unlike any other security control. It is a new network security capability that opens, fully inspects, and edits live network traffic -- at the application layer -- to detect and prevent hacking attempts automatically, and better than any other technology ever invented. It sits in the middle of an internet connection to defeat hacking attempts more effectively than relying on static indicators of compromise (IOCs) or traditional signatures.

Full Content Inspection: The New Standard in Network Security and Why It's Necessary

Full Content Inspection (FCI) is unlike any other security control. It is a new network security capability that opens, fully inspects, and edits live network traffic -- at the application layer -- to detect and prevent hacking attempts automatically, and better than any other technology ever invented. It sits in the middle of an internet connection to defeat hacking attempts more effectively than relying on static indicators of compromise (IOCs) or traditional signatures.
Trinity Cyber
4 Steps to Deploying an AppSec Training Program

4 Steps to Deploying an AppSec Training Program

You can uplevel cybersecurity awareness and improve application security in four simple steps with this AppSec training program guide from CMD+CTRL Security.

4 Steps to Deploying an AppSec Training Program

You can uplevel cybersecurity awareness and improve application security in four simple steps with this AppSec training program guide from CMD+CTRL Security.
CMD+CTRL Security
Enhancing Cybersecurity: The Critical Role Of Software Security Training

Enhancing Cybersecurity: The Critical Role Of Software Security Training

Software vulnerabilities can have a critical impact on operations, from financial losses to delayed time-to-market. Our study found that 89% of developers receive significant security training while other stakeholders often lag behind. Learn more about the critical need for role-based training across all stages of the development lifecycle to reduce organizational risk.

Enhancing Cybersecurity: The Critical Role Of Software Security Training

Software vulnerabilities can have a critical impact on operations, from financial losses to delayed time-to-market. Our study found that 89% of developers receive significant security training while other stakeholders often lag behind. Learn more about the critical need for role-based training across all stages of the development lifecycle to reduce organizational risk.
CMD+CTRL Security
Identifying the Cybersecurity Metrics that Actually Matter

Identifying the Cybersecurity Metrics that Actually Matter

Wednesday, December 11, 2024 at 1 PM EST

Identifying the Cybersecurity Metrics that Actually Matter

Wednesday, December 11, 2024 at 1 PM EST
Axonius
Solution Brief: Introducing the runZero Platform

Solution Brief: Introducing the runZero Platform

runZero is the only CAASM (cyber asset attack surface management) solution that combines powerful proprietary active scanning, native passive discovery and API integrations. Unifying these discovery approaches makes our platform unique in its ability to discover and provide accurate, in-depth fingerprinting for all IT, OT, and IoT devices across on-prem, cloud, and remote environments, including identifying risky unmanaged assets, unknown networks, and outliers. Learn more in our solution brief

Solution Brief: Introducing the runZero Platform

runZero is the only CAASM (cyber asset attack surface management) solution that combines powerful proprietary active scanning, native passive discovery and API integrations. Unifying these discovery approaches makes our platform unique in its ability to discover and provide accurate, in-depth fingerprinting for all IT, OT, and IoT devices across on-prem, cloud, and remote environments, including identifying risky unmanaged assets, unknown networks, and outliers. Learn more in our solution brief
runZero
The State of Asset Security: Uncovering Alarming Gaps & Unexpected Exposures

The State of Asset Security: Uncovering Alarming Gaps & Unexpected Exposures

runZero's research team analyzed tens of millions of data points to understand attack surfaces, exposure patterns, and emerging threats. Our research reveals alarming gaps and unexpected trends, including the decay of network segmentation, persistent challenges in attack surface management, and an increasing volume of dark matter on modern networks. Get the full report to see what we found!

The State of Asset Security: Uncovering Alarming Gaps & Unexpected Exposures

runZero's research team analyzed tens of millions of data points to understand attack surfaces, exposure patterns, and emerging threats. Our research reveals alarming gaps and unexpected trends, including the decay of network segmentation, persistent challenges in attack surface management, and an increasing volume of dark matter on modern networks. Get the full report to see what we found!
runZero
EDR vs. XDR vs. MDR:The Cybersecurity ABCs Explained

EDR vs. XDR vs. MDR:The Cybersecurity ABCs Explained

When considering SIEM alternatives like EDR, XDR, or MDR, making the right choice can significantly impact your ability to optimize resources and reduce your organization’s exposure to threats. Understanding the differences between these solutions, along with how they compare to traditional SIEM tools, is crucial in selecting the best option for your organization’s unique needs.

EDR vs. XDR vs. MDR:The Cybersecurity ABCs Explained

When considering SIEM alternatives like EDR, XDR, or MDR, making the right choice can significantly impact your ability to optimize resources and reduce your organization’s exposure to threats. Understanding the differences between these solutions, along with how they compare to traditional SIEM tools, is crucial in selecting the best option for your organization’s unique needs.
Adlumin
The Executive's Guide to Cybersecurity

The Executive's Guide to Cybersecurity

This overview guide outlines the current cybersecurity threat landscape and how a security operations platform can help organizations better secure their network while also providing security and IT teams with additional resources. It aims to provide executives with a clear understanding of the platform’s business benefits.

The Executive's Guide to Cybersecurity

This overview guide outlines the current cybersecurity threat landscape and how a security operations platform can help organizations better secure their network while also providing security and IT teams with additional resources. It aims to provide executives with a clear understanding of the platform’s business benefits.
Adlumin
The Ultimate Guide to Using Cybersecurity AI

The Ultimate Guide to Using Cybersecurity AI

Explore the benefits of integrating AI into your strategy and learn how it revolutionizes your Security Operations Center (SOC) across crucial threat detection and response stages. This guide aims to provide valuable insights into responsible AI implementation with Adlumin’s recommendations for a strategic approach to cybersecurity.

The Ultimate Guide to Using Cybersecurity AI

Explore the benefits of integrating AI into your strategy and learn how it revolutionizes your Security Operations Center (SOC) across crucial threat detection and response stages. This guide aims to provide valuable insights into responsible AI implementation with Adlumin’s recommendations for a strategic approach to cybersecurity.
Adlumin
Ultimate Buyer's Guide to Managed Detection and Response

Ultimate Buyer's Guide to Managed Detection and Response

Whether you already have an MDR solution or want to implement one, this guide will walk you through five key steps to navigate the MDR market and find the solution that best suits your organization’s needs.

Ultimate Buyer's Guide to Managed Detection and Response

Whether you already have an MDR solution or want to implement one, this guide will walk you through five key steps to navigate the MDR market and find the solution that best suits your organization’s needs.
Adlumin
Delivering Incident Response Excellence: How Wipro enhances customer services with automated investigation and response

Delivering Incident Response Excellence: How Wipro enhances customer services with automated investigation and response

Empowering Wipro with Binalyze AIR's forensic-driven automated investigation and response accelerates investigations through unified, automated workflows. With faster evidence acquisition, enhanced collaboration, and unmatched scalability, AIR enables Wipro to swiftly analyze and remediate complex threats, ensuring robust protection and proactive resilience for global customers.

Delivering Incident Response Excellence: How Wipro enhances customer services with automated investigation and response

Empowering Wipro with Binalyze AIR's forensic-driven automated investigation and response accelerates investigations through unified, automated workflows. With faster evidence acquisition, enhanced collaboration, and unmatched scalability, AIR enables Wipro to swiftly analyze and remediate complex threats, ensuring robust protection and proactive resilience for global customers.
Binalyze
From security alert to action: Accelerating incident response with automated investigations

From security alert to action: Accelerating incident response with automated investigations

From alerts to action: Automated investigation and response (AIR) empowers security teams with comprehensive investigation workflows, transforming incident response from reactive steps into proactive, streamlined processes

From security alert to action: Accelerating incident response with automated investigations

From alerts to action: Automated investigation and response (AIR) empowers security teams with comprehensive investigation workflows, transforming incident response from reactive steps into proactive, streamlined processes
Binalyze
IDC Analyst Brief: Enhancing Incident Response with Automated Investigation Workflows

IDC Analyst Brief: Enhancing Incident Response with Automated Investigation Workflows

Empower your security teams with forensic-driven automated workflows - Accelerate incident response, enhance investigation speed and accuracy and free up resources to focus on high-priority threats. Revolutionize your approach to security with streamlined investigation automation that shortens response times, empower SOC analysts and strengthens your organization’s resilience against evolving cyber threats.

IDC Analyst Brief: Enhancing Incident Response with Automated Investigation Workflows

Empower your security teams with forensic-driven automated workflows - Accelerate incident response, enhance investigation speed and accuracy and free up resources to focus on high-priority threats. Revolutionize your approach to security with streamlined investigation automation that shortens response times, empower SOC analysts and strengthens your organization’s resilience against evolving cyber threats.
Binalyze
Incident response provider CyberClan eyes significant commercial opportunities to scale thanks to automated investigation and response

Incident response provider CyberClan eyes significant commercial opportunities to scale thanks to automated investigation and response

Transforming digital forensics for rapid incident response - Automated investigation and response (AIR) capability empowers CyberClan to elevate incident response with 5x faster triage, streamlined evidence acquisition, and deep investigative insights

Incident response provider CyberClan eyes significant commercial opportunities to scale thanks to automated investigation and response

Transforming digital forensics for rapid incident response - Automated investigation and response (AIR) capability empowers CyberClan to elevate incident response with 5x faster triage, streamlined evidence acquisition, and deep investigative insights
Binalyze
The Unreasonable Effectiveness of Inside Out Attack Surface Management

The Unreasonable Effectiveness of Inside Out Attack Surface Management

Wednesday, December 4, 2024 at 1 PM EST

The Unreasonable Effectiveness of Inside Out Attack Surface Management

Wednesday, December 4, 2024 at 1 PM EST
runZero
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.