Cybersecurity Resource Library

The #1 source for free Cybersecurity reports, whitepapers, webinars, research and more.

Showing results 1 - 30 of 983
Showing results 1 - 30 of 983

Filter by

Filters

Combat Session Hijacking and Credential Theft with Huntress MDR for Microsoft 365

Combat Session Hijacking and Credential Theft with Huntress MDR for Microsoft 365

Available On-Demand

Combat Session Hijacking and Credential Theft with Huntress MDR for Microsoft 365

Available On-Demand
Huntress
The State of Vulnerability Management in the Enterprise

The State of Vulnerability Management in the Enterprise

This just-released Dark Reading report examines vulnerability management practices and uncovers how organizations prioritize security flaws in their environments and what risk-based approaches they are taking to address them.

The State of Vulnerability Management in the Enterprise

This just-released Dark Reading report examines vulnerability management practices and uncovers how organizations prioritize security flaws in their environments and what risk-based approaches they are taking to address them.
Adaptiva
Comprehensive Guide To Security Operations

Comprehensive Guide To Security Operations

A comprehensive guide to minimize risk and continuously improve your security posture.

Comprehensive Guide To Security Operations

A comprehensive guide to minimize risk and continuously improve your security posture.
Arctic Wolf
NIS2: Why European Boards Need to Raise Their Cyber-risk Game

NIS2: Why European Boards Need to Raise Their Cyber-risk Game

The Network and Information Systems 2 (NIS2) directive is a Directive of the European Union to improve the security and resilience of networks and information systems and achieve a high common level of cybersecurity across the member countries in the EU. Companies will be required to disclose network and computer system incidents beyond just data breaches, as critical infrastructure and limited other industries were required under the initial directive.

NIS2: Why European Boards Need to Raise Their Cyber-risk Game

The Network and Information Systems 2 (NIS2) directive is a Directive of the European Union to improve the security and resilience of networks and information systems and achieve a high common level of cybersecurity across the member countries in the EU. Companies will be required to disclose network and computer system incidents beyond just data breaches, as critical infrastructure and limited other industries were required under the initial directive.
Arctic Wolf
Threat Report 2024

Threat Report 2024

This edition of the Arctic Wolf® Labs Threat Report draws upon the first-hand experience of Arctic Wolf’s security experts, augmented by research into the cybercrime ecosystem and additional credited data sources.

Threat Report 2024

This edition of the Arctic Wolf® Labs Threat Report draws upon the first-hand experience of Arctic Wolf’s security experts, augmented by research into the cybercrime ecosystem and additional credited data sources.
Arctic Wolf
IDC MarketScape: Worldwide SIEM for Enterprise 2024 Vendor Assessment

IDC MarketScape: Worldwide SIEM for Enterprise 2024 Vendor Assessment

Google is named a Visionary in the 2024 Gartner® Magic Quadrant™ for Security Information and Event Management (SIEM)

IDC MarketScape: Worldwide SIEM for Enterprise 2024 Vendor Assessment

Google is named a Visionary in the 2024 Gartner® Magic Quadrant™ for Security Information and Event Management (SIEM)
Google Cloud
The Defender's Advantage for Critical Infrastructure and Operational Technology

The Defender's Advantage for Critical Infrastructure and Operational Technology

In the face of escalating cyber threats targeting critical infrastructure and operational technology (OT), this comprehensive guide equips cybersecurity professionals with the knowledge and strategies needed to defend these vital systems.

The Defender's Advantage for Critical Infrastructure and Operational Technology

In the face of escalating cyber threats targeting critical infrastructure and operational technology (OT), this comprehensive guide equips cybersecurity professionals with the knowledge and strategies needed to defend these vital systems.
Google Cloud
The Defender's Advantage Solutions Guide

The Defender's Advantage Solutions Guide

The Defender’s Advantage guide, developed by Mandiant, part of Google Cloud, shares a proactive and intelligence-driven approach to cybersecurity.

The Defender's Advantage Solutions Guide

The Defender’s Advantage guide, developed by Mandiant, part of Google Cloud, shares a proactive and intelligence-driven approach to cybersecurity.
Google Cloud
The Defender's Advantage | A guide to activating cyber defense

The Defender's Advantage | A guide to activating cyber defense

When organizations are faced with adversaries in their own environment, they have a fundamental "defender's advantage."

The Defender's Advantage | A guide to activating cyber defense

When organizations are faced with adversaries in their own environment, they have a fundamental "defender's advantage."
Google Cloud
The Defender's Advantage: Using Artificial Intelligence in Cyber Defense

The Defender's Advantage: Using Artificial Intelligence in Cyber Defense

Organizations today sit in different places on the generative artificial intelligence (AI) adoption spectrum, but regardless of where they land, cyber defense teams can benefit from the use of AI solutions to identify threats, manage toil, and scale talent.

The Defender's Advantage: Using Artificial Intelligence in Cyber Defense

Organizations today sit in different places on the generative artificial intelligence (AI) adoption spectrum, but regardless of where they land, cyber defense teams can benefit from the use of AI solutions to identify threats, manage toil, and scale talent.
Google Cloud
What Network Resilience Means to Enterprise Cybersecurity Posture

What Network Resilience Means to Enterprise Cybersecurity Posture

Monday, November 18, 2024 at 1 PM EST

What Network Resilience Means to Enterprise Cybersecurity Posture

Monday, November 18, 2024 at 1 PM EST
Opentext
Work Smarter, Not Harder with Gemini in Security Operations

Work Smarter, Not Harder with Gemini in Security Operations

Transform your cybersecurity with frontline threat intelligence and expertise, intel-driven security operations, and a secure cloud platform -- all supercharged with AI.

Work Smarter, Not Harder with Gemini in Security Operations

Transform your cybersecurity with frontline threat intelligence and expertise, intel-driven security operations, and a secure cloud platform -- all supercharged with AI.
Google Cloud
6 Key Requirements of Multicloud Security

6 Key Requirements of Multicloud Security

Effective strategies to protect sensitive data and prevent breaches.

6 Key Requirements of Multicloud Security

Effective strategies to protect sensitive data and prevent breaches.
Palo Alto Networks
Frost Radar: Cloud Security Posture Management, 2024

Frost Radar: Cloud Security Posture Management, 2024

Learn why Prisma®️ Cloud was the top-rated innovation leader.

Frost Radar: Cloud Security Posture Management, 2024

Learn why Prisma®️ Cloud was the top-rated innovation leader.
Palo Alto Networks
The Definitive Guide to Container Security

The Definitive Guide to Container Security

The ultimate guide to securing your containers.

The Definitive Guide to Container Security

The ultimate guide to securing your containers.
Palo Alto Networks
The State of Cloud Native Security Report 2024

The State of Cloud Native Security Report 2024

The fourth annual State of Cloud-Native Security report is based on a survey of 2,800 cloud architecture, InfoSec and DevOps professionals across five countries, that will help cybersecurity leaders make decisions about the cloud by examining what’s happening in cloud native security today and what's working best for organizations.

The State of Cloud Native Security Report 2024

The fourth annual State of Cloud-Native Security report is based on a survey of 2,800 cloud architecture, InfoSec and DevOps professionals across five countries, that will help cybersecurity leaders make decisions about the cloud by examining what’s happening in cloud native security today and what's working best for organizations.
Palo Alto Networks
Top 10 CI/CD Security Risks: The Technical Guide

Top 10 CI/CD Security Risks: The Technical Guide

In-Depth Research and Recommendations from 16 Experts

Top 10 CI/CD Security Risks: The Technical Guide

In-Depth Research and Recommendations from 16 Experts
Palo Alto Networks
A Cyber Pros' Guide to Navigating Emerging Privacy Regulation

A Cyber Pros' Guide to Navigating Emerging Privacy Regulation

Tuesday, December 10, 2024 at 1PM EST

A Cyber Pros' Guide to Navigating Emerging Privacy Regulation

Tuesday, December 10, 2024 at 1PM EST
Commvault
The State of Attack Surface Management (ASM), Featuring Forrester

The State of Attack Surface Management (ASM), Featuring Forrester

Friday, November 15, 2024 at 1 PM EST

The State of Attack Surface Management (ASM), Featuring Forrester

Friday, November 15, 2024 at 1 PM EST
Cortex Xpanse, Palo Alto Networks
2024 Global Mobile Threat Report

2024 Global Mobile Threat Report

The Zimperium 2024 Global Mobile Threat Report highlights critical mobile threat trends from the past year.

2024 Global Mobile Threat Report

The Zimperium 2024 Global Mobile Threat Report highlights critical mobile threat trends from the past year.
Zimperium
Applying the Principle of Least Privilege to the Cloud

Applying the Principle of Least Privilege to the Cloud

Tuesday, November 19, 2024 at 1 PM EST

Applying the Principle of Least Privilege to the Cloud

Tuesday, November 19, 2024 at 1 PM EST
Wiz
Cyber Security Review - Laying the foundations for a holistic approach to resilience

Cyber Security Review - Laying the foundations for a holistic approach to resilience

A Cyber Security Review is an essential part of any organisation's security plan. Learn how this eight step review process builds a stronger and more resilient business.

Cyber Security Review - Laying the foundations for a holistic approach to resilience

A Cyber Security Review is an essential part of any organisation's security plan. Learn how this eight step review process builds a stronger and more resilient business.
NCC Group
Safeguarding GitHub Data to Fuel Web Innovation

Safeguarding GitHub Data to Fuel Web Innovation

Thursday, November 21, 2024 at 12 PM EST

Safeguarding GitHub Data to Fuel Web Innovation

Thursday, November 21, 2024 at 12 PM EST
Rewind
Sustainable cyber security strategy: How to comply with Privacy Act legislative changes and increase alignment with Essential Eight cyber security framework while improving your cyber security posture

Sustainable cyber security strategy: How to comply with Privacy Act legislative changes and increase alignment with Essential Eight cyber security framework while improving your cyber security posture

Is your cybersecurity programme fit-for-purpose? If compromised, can you afford the subsequent financial penalties, negative publicity and potential jail time? Understand your Australian cyber security compliance obligations and learn what you need to be doing to protect your organisation’s sensitive data, market reputation and ongoing viability.

Sustainable cyber security strategy: How to comply with Privacy Act legislative changes and increase alignment with Essential Eight cyber security framework while improving your cyber security posture

Is your cybersecurity programme fit-for-purpose? If compromised, can you afford the subsequent financial penalties, negative publicity and potential jail time? Understand your Australian cyber security compliance obligations and learn what you need to be doing to protect your organisation’s sensitive data, market reputation and ongoing viability.
NCC Group
Demystifying Data Protection: A Blueprint for DLP Program Development

Demystifying Data Protection: A Blueprint for DLP Program Development

Navigating modern data security challenges requires a deliberate approach to data security that includes re-evaluating the tools and processes that organizations use. Develop a comprehensive data protection or data loss prevention program to make it easier to address risks while consolidating buy-in. Start with DLP and data lineage to secure sensitive data. Discover the evolving role of DLP and insider risk management in today’s cybersecurity landscape.

Demystifying Data Protection: A Blueprint for DLP Program Development

Navigating modern data security challenges requires a deliberate approach to data security that includes re-evaluating the tools and processes that organizations use. Develop a comprehensive data protection or data loss prevention program to make it easier to address risks while consolidating buy-in. Start with DLP and data lineage to secure sensitive data. Discover the evolving role of DLP and insider risk management in today’s cybersecurity landscape.
Cyberhaven
DLP Buyer's Guide: 11 Criteria for Evaluating Data Loss Prevention Solutions

DLP Buyer's Guide: 11 Criteria for Evaluating Data Loss Prevention Solutions

The technology that people use in the workplace is changing, and with that change comes new risks to corporate data. Whether you’re buying a DLP product for the first time, or replacing an older solution, the DLP Buyer's Guide summarizes 11 essential criteria for evaluating Data Loss Prevention solutions. Learn about data lineage integration and real-time insider risk mitigation. Read how to protect sensitive data across every channel with unified policies and cloud-based simplicity.

DLP Buyer's Guide: 11 Criteria for Evaluating Data Loss Prevention Solutions

The technology that people use in the workplace is changing, and with that change comes new risks to corporate data. Whether you’re buying a DLP product for the first time, or replacing an older solution, the DLP Buyer's Guide summarizes 11 essential criteria for evaluating Data Loss Prevention solutions. Learn about data lineage integration and real-time insider risk mitigation. Read how to protect sensitive data across every channel with unified policies and cloud-based simplicity.
Cyberhaven
The Top 15 Data Detection & Response (DDR) Use Cases

The Top 15 Data Detection & Response (DDR) Use Cases

Discover how the convergence of DLP and insider risk management into data detection and response (DDR) is revolutionizing data security. DDR improves upon existing data loss prevention (DLP) solutions by using Data Lineage to analyze events related to all pieces of data. Learn how data lineage unlocks 15 key use cases to enhance data protection and ensure unmatched accuracy in data classification. Identify ways that you can leverage DDR to prevent exfiltration and mitigate insider threats.

The Top 15 Data Detection & Response (DDR) Use Cases

Discover how the convergence of DLP and insider risk management into data detection and response (DDR) is revolutionizing data security. DDR improves upon existing data loss prevention (DLP) solutions by using Data Lineage to analyze events related to all pieces of data. Learn how data lineage unlocks 15 key use cases to enhance data protection and ensure unmatched accuracy in data classification. Identify ways that you can leverage DDR to prevent exfiltration and mitigate insider threats.
Cyberhaven
Cyber-Physical Solutions for Safer & Smarter Business Growth

Cyber-Physical Solutions for Safer & Smarter Business Growth

Protect your business from cyber and physical threats with integrated security solutions for comprehensive threat management.

Cyber-Physical Solutions for Safer & Smarter Business Growth

Protect your business from cyber and physical threats with integrated security solutions for comprehensive threat management.
Claro Enterprise Solutions
Transform Your Security Operations And Move Beyond Legacy SIEM

Transform Your Security Operations And Move Beyond Legacy SIEM

Wednesday, November 6, 2024 at 1 PM EST

Transform Your Security Operations And Move Beyond Legacy SIEM

Wednesday, November 6, 2024 at 1 PM EST
Palo Alto Networks
5 Benefits of Autonomous Pentesting

5 Benefits of Autonomous Pentesting

Stay One Step Ahead: Unlock the Power of Autonomous Pentesting

5 Benefits of Autonomous Pentesting

Stay One Step Ahead: Unlock the Power of Autonomous Pentesting
Ironwood Cyber
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.