Cybersecurity Resource Library

The #1 source for free Cybersecurity reports, whitepapers, webinars, research and more.

Showing results 1 - 30 of 1012
Showing results 1 - 30 of 1012

Filter by

Filters

Uncovering Threats to Your Mainframe & How to Keep Host Access Secure

Uncovering Threats to Your Mainframe & How to Keep Host Access Secure

Thursday, February 13, 2025 at 1 PM EDT

Uncovering Threats to Your Mainframe & How to Keep Host Access Secure

Thursday, February 13, 2025 at 1 PM EDT
Rocket Software
60 Facts to Know For the Modern CISO

60 Facts to Know For the Modern CISO

Find out why 60% of organizations lack confidence in their defenses and how you can break the cycle. The Big CISO Factbook is your essential guide to overcoming today's most pressing security challenges.

60 Facts to Know For the Modern CISO

Find out why 60% of organizations lack confidence in their defenses and how you can break the cycle. The Big CISO Factbook is your essential guide to overcoming today's most pressing security challenges.
GYTPOL
A Gap Analysis of Endpoint Configuration Security

A Gap Analysis of Endpoint Configuration Security

Every year, over 4,000 ransomware attacks take advantage of device misconfigurations. Hackers exploit these security gaps to gain easy access and move laterally. Proactive protection demands smart, well-maintained configurations. Most organization fall short. Are you among them?

A Gap Analysis of Endpoint Configuration Security

Every year, over 4,000 ransomware attacks take advantage of device misconfigurations. Hackers exploit these security gaps to gain easy access and move laterally. Proactive protection demands smart, well-maintained configurations. Most organization fall short. Are you among them?
GYTPOL
The Security Team's Guide to Reducing SIEM Costs

The Security Team's Guide to Reducing SIEM Costs

Available On-Demand

The Security Team's Guide to Reducing SIEM Costs

Available On-Demand
Chronosphere
4 Best Practices for Hybrid Security Policy Management

4 Best Practices for Hybrid Security Policy Management

Networks are evolving and your network security is getting more complex. Download this white paper to explore the challenges of managing security policies across hybrid infrastructures and four best practices to overcome these challenges.

4 Best Practices for Hybrid Security Policy Management

Networks are evolving and your network security is getting more complex. Download this white paper to explore the challenges of managing security policies across hybrid infrastructures and four best practices to overcome these challenges.
Tufin
How CISOs Navigate the Regulatory and Compliance Maze

How CISOs Navigate the Regulatory and Compliance Maze

Wednesday, February 26, 2025 at 1 PM EST

How CISOs Navigate the Regulatory and Compliance Maze

Wednesday, February 26, 2025 at 1 PM EST
Black Duck Software
The State of Firewall Security: Challenges, Risks, and Solutions for Modern Networks

The State of Firewall Security: Challenges, Risks, and Solutions for Modern Networks

The Evolving Landscape of Network Security in 2025

The State of Firewall Security: Challenges, Risks, and Solutions for Modern Networks

The Evolving Landscape of Network Security in 2025
Tufin
Tips on Managing Cloud Security in a Hybrid Environment

Tips on Managing Cloud Security in a Hybrid Environment

Wednesday, January 29, 2025 at 1 PM EDT

Tips on Managing Cloud Security in a Hybrid Environment

Wednesday, January 29, 2025 at 1 PM EDT
CyberArk Software
How to Use AI for Security Good

How to Use AI for Security Good

| Special Keynote | Thursday, January 30, 2025| 2:00pm ET | Cybersecurity Outlook 2025 Virtual Event | Dark Reading and Omdia

How to Use AI for Security Good

| Special Keynote | Thursday, January 30, 2025| 2:00pm ET | Cybersecurity Outlook 2025 Virtual Event | Dark Reading and Omdia
Dark Reading
The Pragmatic CISO's New Year's Resolutions for 2025

The Pragmatic CISO's New Year's Resolutions for 2025

| Special Keynote | Thursday, January 30, 2025 | 1:00pm ET | Cybersecurity Outlook 2025 Virtual Event | Dark Reading and Omdia

The Pragmatic CISO's New Year's Resolutions for 2025

| Special Keynote | Thursday, January 30, 2025 | 1:00pm ET | Cybersecurity Outlook 2025 Virtual Event | Dark Reading and Omdia
Dark Reading
Shifting Left: DevSecOps in the Cloud

Shifting Left: DevSecOps in the Cloud

Tuesday, February 4, 2025 at 1 PM EST

Shifting Left: DevSecOps in the Cloud

Tuesday, February 4, 2025 at 1 PM EST
Wiz
Social Engineering: New Tricks, New Threats, New Defenses

Social Engineering: New Tricks, New Threats, New Defenses

This is an executive summary of the “Social Engineering: New Tricks, New Threats, New Defenses” webinar that took place October 22, 2024. The speaker was Yihao Lim, Lead Threat Intelligence Advisor, Google Cloud Security. The webinar was moderated by Peter Krass, editor at Dark Reading.

Social Engineering: New Tricks, New Threats, New Defenses

This is an executive summary of the “Social Engineering: New Tricks, New Threats, New Defenses” webinar that took place October 22, 2024. The speaker was Yihao Lim, Lead Threat Intelligence Advisor, Google Cloud Security. The webinar was moderated by Peter Krass, editor at Dark Reading.
Google Cloud Security
Understanding Social Engineering Attacks and What To Do About Them

Understanding Social Engineering Attacks and What To Do About Them

Social engineering attacks are getting more sophisticated. This just-released Dark Reading report examines the latest social engineering threats and defenses. Enterprise security teams are adapting to the latest threats with multi-layered defense and improved training.

Understanding Social Engineering Attacks and What To Do About Them

Social engineering attacks are getting more sophisticated. This just-released Dark Reading report examines the latest social engineering threats and defenses. Enterprise security teams are adapting to the latest threats with multi-layered defense and improved training.
Google Cloud Security
6 Best Practices for Developer Security in a Financial Services Institution

6 Best Practices for Developer Security in a Financial Services Institution

Developer security best practices for FinServ

6 Best Practices for Developer Security in a Financial Services Institution

Developer security best practices for FinServ
Snyk
Beyond DLP: Embracing the New Necessities of Data Security

Beyond DLP: Embracing the New Necessities of Data Security

Read the eBook to learn why DSPM is a critical component of data security programs in the age of AI, and how organizations are adapting to the changing digital landscape to secure their sensitive data.

Beyond DLP: Embracing the New Necessities of Data Security

Read the eBook to learn why DSPM is a critical component of data security programs in the age of AI, and how organizations are adapting to the changing digital landscape to secure their sensitive data.
Cyera
Case Study: How a multinational pharmaceutical company uses Cyera to improve data security and compliance

Case Study: How a multinational pharmaceutical company uses Cyera to improve data security and compliance

Download the case study to learn how a multinational pharmaceutical company uses Cyera to improve data security and compliance.

Case Study: How a multinational pharmaceutical company uses Cyera to improve data security and compliance

Download the case study to learn how a multinational pharmaceutical company uses Cyera to improve data security and compliance.
Cyera
Cloud Cost Optimization Guide

Cloud Cost Optimization Guide

CISOs must balance the competing demands of improving security, while also consolidating resources. This task is made all the more challenging by business growth which can expand attack surfaces. View this paper to examine how cloud optimization can reduce costs while improving security and compliance.

Cloud Cost Optimization Guide

CISOs must balance the competing demands of improving security, while also consolidating resources. This task is made all the more challenging by business growth which can expand attack surfaces. View this paper to examine how cloud optimization can reduce costs while improving security and compliance.
Cyera
Data and Identity: The Evolving Security Paradigm

Data and Identity: The Evolving Security Paradigm

Data and identity have become the primary targets for cyberattacks, driven by the exponential growth in data volumes and the increasing complexity of identity management.

Data and Identity: The Evolving Security Paradigm

Data and identity have become the primary targets for cyberattacks, driven by the exponential growth in data volumes and the increasing complexity of identity management.
Cyera
DSPM Buyer's Guide

DSPM Buyer's Guide

Download the DSPM Buyer's Guide to learn what to look for in a DSPM solution, key considerations when evaluating DSPM solutions, and how to spot a legacy approach claiming "DSPM".

DSPM Buyer's Guide

Download the DSPM Buyer's Guide to learn what to look for in a DSPM solution, key considerations when evaluating DSPM solutions, and how to spot a legacy approach claiming "DSPM".
Cyera
Optimizing AppSec in the Financial Services Sector

Optimizing AppSec in the Financial Services Sector

A buyer’s guide for meeting the unprecedented speed and complexity of today’s development practices

Optimizing AppSec in the Financial Services Sector

A buyer’s guide for meeting the unprecedented speed and complexity of today’s development practices
Snyk
ASRM Cyberisk

ASRM Cyberisk

Getting under the surface of your Cyber Risk

ASRM Cyberisk

Getting under the surface of your Cyber Risk
Trend Micro, Inc.
ASRM Use Case Risk Prioritization

ASRM Use Case Risk Prioritization

Elevate Your Risk Prioritization & Mitigation

ASRM Use Case Risk Prioritization

Elevate Your Risk Prioritization & Mitigation
Trend Micro, Inc.
IDC Tech Assessment Guide ASRM

IDC Tech Assessment Guide ASRM

Across the Entire Attack Surface: Risk Requires a Platform

IDC Tech Assessment Guide ASRM

Across the Entire Attack Surface: Risk Requires a Platform
Trend Micro, Inc.
Omdia ASM eBook

Omdia ASM eBook

Understanding ASM in the context of Continuous Security Protection

Omdia ASM eBook

Understanding ASM in the context of Continuous Security Protection
Trend Micro, Inc.
Top 5 Things to Know About Cyber Resilience for Network Devices

Top 5 Things to Know About Cyber Resilience for Network Devices

In today's world, cyber resilience is no longer a choice - it's a necessity. Yet, despite growing awareness of its importance, network devices remain a significant vulnerability in many organizations' defenses.

Top 5 Things to Know About Cyber Resilience for Network Devices

In today's world, cyber resilience is no longer a choice - it's a necessity. Yet, despite growing awareness of its importance, network devices remain a significant vulnerability in many organizations' defenses.
BackBox Software
Transforming Network Configuration Management: Challenges and Solutions

Transforming Network Configuration Management: Challenges and Solutions

The traditional Network Configuration Management (NCM) model is no longer fit for purpose: With hybrid networks and increasing complexity on the rise, network teams need innovative solutions to stay ahead.

Transforming Network Configuration Management: Challenges and Solutions

The traditional Network Configuration Management (NCM) model is no longer fit for purpose: With hybrid networks and increasing complexity on the rise, network teams need innovative solutions to stay ahead.
BackBox Software
When Cyber Resilience Lags IT Exploits, Automation is the Answer

When Cyber Resilience Lags IT Exploits, Automation is the Answer

Rapidly evolving cyber threats demand a proactive approach: Cyber Resilience. By prioritizing this strategic imperative, organizations can effectively mitigate risk and ensure business continuity in the face of increasing digital complexity.

When Cyber Resilience Lags IT Exploits, Automation is the Answer

Rapidly evolving cyber threats demand a proactive approach: Cyber Resilience. By prioritizing this strategic imperative, organizations can effectively mitigate risk and ensure business continuity in the face of increasing digital complexity.
BackBox Software
Fireside Chat with Graham Cluley: Known and Unknown Risks of AI Adoption in 2025

Fireside Chat with Graham Cluley: Known and Unknown Risks of AI Adoption in 2025

Wednesday, January 15, 2025 at 1 PM EST

Fireside Chat with Graham Cluley: Known and Unknown Risks of AI Adoption in 2025

Wednesday, January 15, 2025 at 1 PM EST
Rubrik
From Reactive to Proactive: How Allowlisting Turns the Tables on Zero-Day Vulnerabilities

From Reactive to Proactive: How Allowlisting Turns the Tables on Zero-Day Vulnerabilities

This is an executive summary of the “From Reactive to Proactive: How Allowlisting Turns the Tables on Zero-Day Vulnerabilities” webinar that took place October 17th, 2024. The speaker was Rob Allen, Chief Product Officer (CPO), ThreatLocker. The webinar was moderated Jonathan Care, Advisor, Lionfish Tech Advisors (Moderator)

From Reactive to Proactive: How Allowlisting Turns the Tables on Zero-Day Vulnerabilities

This is an executive summary of the “From Reactive to Proactive: How Allowlisting Turns the Tables on Zero-Day Vulnerabilities” webinar that took place October 17th, 2024. The speaker was Rob Allen, Chief Product Officer (CPO), ThreatLocker. The webinar was moderated Jonathan Care, Advisor, Lionfish Tech Advisors (Moderator)
ThreatLocker
100 Critical Security Questions to Address in Your Trust Center

100 Critical Security Questions to Address in Your Trust Center

We analyzed data from hundreds of SafeBase Trust Centers across industries to uncover the top 100 core questions most frequently asked in security reviews.

100 Critical Security Questions to Address in Your Trust Center

We analyzed data from hundreds of SafeBase Trust Centers across industries to uncover the top 100 core questions most frequently asked in security reviews.
SafeBase
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.