Sponsored By

Cybersecurity Resource Library

The #1 source for free Cybersecurity reports, whitepapers, webinars, research and more.

Showing results 1 - 30 of 820
Showing results 1 - 30 of 820

Filter by

Filters

10 Ways Asset Visibility Build the Foundation for OT Cybersecurity

10 Ways Asset Visibility Build the Foundation for OT Cybersecurity

This whitepaper provides insight into 10 distinct ways that asset visibility helps inform a broader strategy for OT visibility

10 Ways Asset Visibility Build the Foundation for OT Cybersecurity

This whitepaper provides insight into 10 distinct ways that asset visibility helps inform a broader strategy for OT visibility
Dragos, Inc.
2023 OT Cybersecurity Year in Review

2023 OT Cybersecurity Year in Review

The 7th edition of the Dragos OT Cybersecurity Year in Review report synthesizes the latest OT threat intelligence, vulnerabilities in industrial control systems, and defense mechanisms from the trenches -- it’s your blueprint to OT cyber resilience.

2023 OT Cybersecurity Year in Review

The 7th edition of the Dragos OT Cybersecurity Year in Review report synthesizes the latest OT threat intelligence, vulnerabilities in industrial control systems, and defense mechanisms from the trenches -- it’s your blueprint to OT cyber resilience.
Dragos, Inc.
2023 OT Cybersecurity Year in Review

2023 OT Cybersecurity Year in Review

The 7th annual Dragos Year in Review Executive Summary gives you just the highlights from this year’s report to help you stay ahead of cyber attacks and protect your business operations in 2024.

2023 OT Cybersecurity Year in Review

The 7th annual Dragos Year in Review Executive Summary gives you just the highlights from this year’s report to help you stay ahead of cyber attacks and protect your business operations in 2024.
Dragos, Inc.
5 Critical Controls for World-Class OT Cybersecurity

5 Critical Controls for World-Class OT Cybersecurity

Download this free guide to discover the key components of a world-class OT cybersecurity program.

5 Critical Controls for World-Class OT Cybersecurity

Download this free guide to discover the key components of a world-class OT cybersecurity program.
Dragos, Inc.
A deep dive into OWASP MASVS-Resilience

A deep dive into OWASP MASVS-Resilience

We've broken down the OWASP MASVS (Mobile Application Security Verification Standard) framework into digestible and actionable sections with helpful callouts and visualizations to help guide teams that are focused on mobile app security and resiliency.

A deep dive into OWASP MASVS-Resilience

We've broken down the OWASP MASVS (Mobile Application Security Verification Standard) framework into digestible and actionable sections with helpful callouts and visualizations to help guide teams that are focused on mobile app security and resiliency.
Promon
App Threat Report: The State of iOS App Security

App Threat Report: The State of iOS App Security

Are iOS apps more secure than Android? We put them to the test. Our security research team tested the 100 most downloaded iOS apps in the world against a repackaging attack. The results were startling: 93% of the apps were vulnerable! Download a copy of the latest App Threat Report for the full results.

App Threat Report: The State of iOS App Security

Are iOS apps more secure than Android? We put them to the test. Our security research team tested the 100 most downloaded iOS apps in the world against a repackaging attack. The results were startling: 93% of the apps were vulnerable! Download a copy of the latest App Threat Report for the full results.
Promon
VOLTZITE Espionage Operations Targeting U.S. Critical Systems

VOLTZITE Espionage Operations Targeting U.S. Critical Systems

This Intelligence Brief shares information Dragos Intelligence has collected on these espionage operations targeting of U.S. critical infrastructure, with clear guidance for OT asset owners and operators on how to defend against stealthy operators like VOLTZITE.

VOLTZITE Espionage Operations Targeting U.S. Critical Systems

This Intelligence Brief shares information Dragos Intelligence has collected on these espionage operations targeting of U.S. critical infrastructure, with clear guidance for OT asset owners and operators on how to defend against stealthy operators like VOLTZITE.
Dragos, Inc.
Upgrade your cybersecurity in the era of AI

Upgrade your cybersecurity in the era of AI

Upgrade your cybersecurity in the era of AI

Upgrade your cybersecurity in the era of AI

Upgrade your cybersecurity in the era of AI
Microsoft
Gcore Radar

Gcore Radar

Gcore Radar is a twice-annual report on key trends in the ever-evolving DDoS landscape. Data includes most-targeted industries, prevalence of attack types, attack characteristics and trends, and common perpetrator and victim locations. The publication equips readers with actionable intelligence to make informed decisions about their cybersecurity strategy.

Gcore Radar

Gcore Radar is a twice-annual report on key trends in the ever-evolving DDoS landscape. Data includes most-targeted industries, prevalence of attack types, attack characteristics and trends, and common perpetrator and victim locations. The publication equips readers with actionable intelligence to make informed decisions about their cybersecurity strategy.
Gcore
How To Optimize and Accelerate Cybersecurity Initiatives for Your Business

How To Optimize and Accelerate Cybersecurity Initiatives for Your Business

| Live Webinar | Tuesday, March 26, 2024 | 1pm ET |

How To Optimize and Accelerate Cybersecurity Initiatives for Your Business

| Live Webinar | Tuesday, March 26, 2024 | 1pm ET |
Mandiant
Cheat Sheet - 5 Strategic Security Checkpoints

Cheat Sheet - 5 Strategic Security Checkpoints

Before implementing an Application Security Program Management (ASPM) solution, it's crucial to evaluate your current application security landscape

Cheat Sheet - 5 Strategic Security Checkpoints

Before implementing an Application Security Program Management (ASPM) solution, it's crucial to evaluate your current application security landscape
Snyk
The Anatomy of a Ransomware Attack, Revealed

The Anatomy of a Ransomware Attack, Revealed

| Live Webinar | Wednesday, March 20, 2024 | 1pm ET |

The Anatomy of a Ransomware Attack, Revealed

| Live Webinar | Wednesday, March 20, 2024 | 1pm ET |
ExtraHop
Collective defense is more important than ever--is your workforce ready?

Collective defense is more important than ever--is your workforce ready?

Access exclusive insights and strategies on how to utilize collective defense against surging Cyber threats with Microsoft's integrated AI and human-centric approach to Cybersecurity.

Collective defense is more important than ever--is your workforce ready?

Access exclusive insights and strategies on how to utilize collective defense against surging Cyber threats with Microsoft's integrated AI and human-centric approach to Cybersecurity.
Microsoft
Unleash the Power of Gen AI for Application Development, Securely

Unleash the Power of Gen AI for Application Development, Securely

Live Webinar | March 19, 2024 | 1pm ET

Unleash the Power of Gen AI for Application Development, Securely

Live Webinar | March 19, 2024 | 1pm ET
Snyk
How Hackers Execute Mobile Attacks

How Hackers Execute Mobile Attacks

View the report explaining the anatomy of mobile attacks and discover security measures.

How Hackers Execute Mobile Attacks

View the report explaining the anatomy of mobile attacks and discover security measures.
Zimperium
Mobile Banking Heist Report

Mobile Banking Heist Report

Banking trojans continue to evolve and succeed due to their ability to persist, bypass security, and evade detection on mobile devices. In this report, Zimperium shares insights on how to develop mobile app security strategies that align with today's sophisticated malware.

Mobile Banking Heist Report

Banking trojans continue to evolve and succeed due to their ability to persist, bypass security, and evade detection on mobile devices. In this report, Zimperium shares insights on how to develop mobile app security strategies that align with today's sophisticated malware.
Zimperium
OWASP Mobile Top 10 List: Why Publish a Separate List for Mobile?

OWASP Mobile Top 10 List: Why Publish a Separate List for Mobile?

OWASPs top 10 lists reveal the biggest risks and the best mitigation strategies. Learn why they’re important and why there are different lists for web apps and mobile apps.

OWASP Mobile Top 10 List: Why Publish a Separate List for Mobile?

OWASPs top 10 lists reveal the biggest risks and the best mitigation strategies. Learn why they’re important and why there are different lists for web apps and mobile apps.
Zimperium
State of Mobile App Security

State of Mobile App Security

Mobile apps have rapidly transformed; with improved internet speeds and the global demand for instant access to data and services, mobile apps have become a dominant form of digital interaction in our work and personal lives, discover in Zimperium's report.

State of Mobile App Security

Mobile apps have rapidly transformed; with improved internet speeds and the global demand for instant access to data and services, mobile apps have become a dominant form of digital interaction in our work and personal lives, discover in Zimperium's report.
Zimperium
Zimperium Secures Connected Apps for Leading Medical Device Manufacturer

Zimperium Secures Connected Apps for Leading Medical Device Manufacturer

Discover how Zimperium helped a major healthcare and pharmaceutical manufacturer secure their connected apps all while protecting patient data, complying with FDA security requirements and more.

Zimperium Secures Connected Apps for Leading Medical Device Manufacturer

Discover how Zimperium helped a major healthcare and pharmaceutical manufacturer secure their connected apps all while protecting patient data, complying with FDA security requirements and more.
Zimperium
2023 Threat Detection Report

2023 Threat Detection Report

Understand prevalent trends, cyber threats, and adversary techniques.

2023 Threat Detection Report

Understand prevalent trends, cyber threats, and adversary techniques.
Red Canary
Executive Summary: Incident Response & Readiness

Executive Summary: Incident Response & Readiness

What security leadership needs to know right now

Executive Summary: Incident Response & Readiness

What security leadership needs to know right now
Red Canary
Incident Response & Readiness Guide

Incident Response & Readiness Guide

Timing and response plans could mean the difference between an attempted attack or full-blown compromise. This guide arms security teams with the blueprint for a modern and effective incident response plan.

Incident Response & Readiness Guide

Timing and response plans could mean the difference between an attempted attack or full-blown compromise. This guide arms security teams with the blueprint for a modern and effective incident response plan.
Red Canary
MDR Buyer's Guide

MDR Buyer's Guide

When evaluating MDR vendors, organizations should consider several elements, from the provider’s investigation and response capabilities to their depth of detection and beyond.

MDR Buyer's Guide

When evaluating MDR vendors, organizations should consider several elements, from the provider’s investigation and response capabilities to their depth of detection and beyond.
Red Canary
5 Pragmatic Tips for Preventing Ransomware

5 Pragmatic Tips for Preventing Ransomware

Available On-Demand

5 Pragmatic Tips for Preventing Ransomware

Available On-Demand
Gigamon
Quickly Respond to Attacks Across Your Network

Quickly Respond to Attacks Across Your Network

Detect and stop threats faster with FortiNDR

Quickly Respond to Attacks Across Your Network

Detect and stop threats faster with FortiNDR
Fortinet
Understanding Today's Threat Actors

Understanding Today's Threat Actors

Threats of all shapes and sizes are putting organizations everywhere at risk. As a result, traditional security controls are no longer sufficient for protecting your organization.

Understanding Today's Threat Actors

Threats of all shapes and sizes are putting organizations everywhere at risk. As a result, traditional security controls are no longer sufficient for protecting your organization.
Fortinet
Use the 2023 MITRE ATT&CK® Evaluation Results for Turla to Inform EDR Buying Decisions

Use the 2023 MITRE ATT&CK® Evaluation Results for Turla to Inform EDR Buying Decisions

Organizations need new tools to defend against today's threat landscape.

Use the 2023 MITRE ATT&CK® Evaluation Results for Turla to Inform EDR Buying Decisions

Organizations need new tools to defend against today's threat landscape.
Fortinet
Assessing Your Critical Applications' Cyber Defenses

Assessing Your Critical Applications' Cyber Defenses

| Live Webinar | Wednesday, March 13th, 2024 | 1pm ET |

Assessing Your Critical Applications' Cyber Defenses

| Live Webinar | Wednesday, March 13th, 2024 | 1pm ET |
Mandiant
Building a Modern Endpoint Strategy for 2024 and Beyond

Building a Modern Endpoint Strategy for 2024 and Beyond

| Live Webinar | Wednesday, March 27, 2024 | 1pm ET |

Building a Modern Endpoint Strategy for 2024 and Beyond

| Live Webinar | Wednesday, March 27, 2024 | 1pm ET |
Sophos
CNAPP for Dummies

CNAPP for Dummies

Everything you need to know to secure the changing landscape of CNAPP

CNAPP for Dummies

Everything you need to know to secure the changing landscape of CNAPP
Wiz
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.