Cybersecurity Resource Library

The #1 source for free Cybersecurity reports, whitepapers, webinars, research and more.

Showing results 61 - 90 of 998
Showing results 61 - 90 of 998

Filter by

Filters

Top 10 CI/CD Security Risks: The Technical Guide

Top 10 CI/CD Security Risks: The Technical Guide

In-Depth Research and Recommendations from 16 Experts

Top 10 CI/CD Security Risks: The Technical Guide

In-Depth Research and Recommendations from 16 Experts
Palo Alto Networks
A Cyber Pros' Guide to Navigating Emerging Privacy Regulation

A Cyber Pros' Guide to Navigating Emerging Privacy Regulation

Tuesday, December 10, 2024 at 1PM EST

A Cyber Pros' Guide to Navigating Emerging Privacy Regulation

Tuesday, December 10, 2024 at 1PM EST
Commvault
The State of Attack Surface Management (ASM), Featuring Forrester

The State of Attack Surface Management (ASM), Featuring Forrester

Friday, November 15, 2024 at 1 PM EST

The State of Attack Surface Management (ASM), Featuring Forrester

Friday, November 15, 2024 at 1 PM EST
Cortex Xpanse, Palo Alto Networks
2024 Global Mobile Threat Report

2024 Global Mobile Threat Report

The Zimperium 2024 Global Mobile Threat Report highlights critical mobile threat trends from the past year.

2024 Global Mobile Threat Report

The Zimperium 2024 Global Mobile Threat Report highlights critical mobile threat trends from the past year.
Zimperium
Applying the Principle of Least Privilege to the Cloud

Applying the Principle of Least Privilege to the Cloud

Tuesday, November 19, 2024 at 1 PM EST

Applying the Principle of Least Privilege to the Cloud

Tuesday, November 19, 2024 at 1 PM EST
Wiz
Cyber Security Review - Laying the foundations for a holistic approach to resilience

Cyber Security Review - Laying the foundations for a holistic approach to resilience

A Cyber Security Review is an essential part of any organisation's security plan. Learn how this eight step review process builds a stronger and more resilient business.

Cyber Security Review - Laying the foundations for a holistic approach to resilience

A Cyber Security Review is an essential part of any organisation's security plan. Learn how this eight step review process builds a stronger and more resilient business.
NCC Group
Safeguarding GitHub Data to Fuel Web Innovation

Safeguarding GitHub Data to Fuel Web Innovation

Thursday, November 21, 2024 at 12 PM EST

Safeguarding GitHub Data to Fuel Web Innovation

Thursday, November 21, 2024 at 12 PM EST
Rewind
Sustainable cyber security strategy: How to comply with Privacy Act legislative changes and increase alignment with Essential Eight cyber security framework while improving your cyber security posture

Sustainable cyber security strategy: How to comply with Privacy Act legislative changes and increase alignment with Essential Eight cyber security framework while improving your cyber security posture

Is your cybersecurity programme fit-for-purpose? If compromised, can you afford the subsequent financial penalties, negative publicity and potential jail time? Understand your Australian cyber security compliance obligations and learn what you need to be doing to protect your organisation’s sensitive data, market reputation and ongoing viability.

Sustainable cyber security strategy: How to comply with Privacy Act legislative changes and increase alignment with Essential Eight cyber security framework while improving your cyber security posture

Is your cybersecurity programme fit-for-purpose? If compromised, can you afford the subsequent financial penalties, negative publicity and potential jail time? Understand your Australian cyber security compliance obligations and learn what you need to be doing to protect your organisation’s sensitive data, market reputation and ongoing viability.
NCC Group
Demystifying Data Protection: A Blueprint for DLP Program Development

Demystifying Data Protection: A Blueprint for DLP Program Development

Navigating modern data security challenges requires a deliberate approach to data security that includes re-evaluating the tools and processes that organizations use. Develop a comprehensive data protection or data loss prevention program to make it easier to address risks while consolidating buy-in. Start with DLP and data lineage to secure sensitive data. Discover the evolving role of DLP and insider risk management in today’s cybersecurity landscape.

Demystifying Data Protection: A Blueprint for DLP Program Development

Navigating modern data security challenges requires a deliberate approach to data security that includes re-evaluating the tools and processes that organizations use. Develop a comprehensive data protection or data loss prevention program to make it easier to address risks while consolidating buy-in. Start with DLP and data lineage to secure sensitive data. Discover the evolving role of DLP and insider risk management in today’s cybersecurity landscape.
Cyberhaven
DLP Buyer's Guide: 11 Criteria for Evaluating Data Loss Prevention Solutions

DLP Buyer's Guide: 11 Criteria for Evaluating Data Loss Prevention Solutions

The technology that people use in the workplace is changing, and with that change comes new risks to corporate data. Whether you’re buying a DLP product for the first time, or replacing an older solution, the DLP Buyer's Guide summarizes 11 essential criteria for evaluating Data Loss Prevention solutions. Learn about data lineage integration and real-time insider risk mitigation. Read how to protect sensitive data across every channel with unified policies and cloud-based simplicity.

DLP Buyer's Guide: 11 Criteria for Evaluating Data Loss Prevention Solutions

The technology that people use in the workplace is changing, and with that change comes new risks to corporate data. Whether you’re buying a DLP product for the first time, or replacing an older solution, the DLP Buyer's Guide summarizes 11 essential criteria for evaluating Data Loss Prevention solutions. Learn about data lineage integration and real-time insider risk mitigation. Read how to protect sensitive data across every channel with unified policies and cloud-based simplicity.
Cyberhaven
The Top 15 Data Detection & Response (DDR) Use Cases

The Top 15 Data Detection & Response (DDR) Use Cases

Discover how the convergence of DLP and insider risk management into data detection and response (DDR) is revolutionizing data security. DDR improves upon existing data loss prevention (DLP) solutions by using Data Lineage to analyze events related to all pieces of data. Learn how data lineage unlocks 15 key use cases to enhance data protection and ensure unmatched accuracy in data classification. Identify ways that you can leverage DDR to prevent exfiltration and mitigate insider threats.

The Top 15 Data Detection & Response (DDR) Use Cases

Discover how the convergence of DLP and insider risk management into data detection and response (DDR) is revolutionizing data security. DDR improves upon existing data loss prevention (DLP) solutions by using Data Lineage to analyze events related to all pieces of data. Learn how data lineage unlocks 15 key use cases to enhance data protection and ensure unmatched accuracy in data classification. Identify ways that you can leverage DDR to prevent exfiltration and mitigate insider threats.
Cyberhaven
Transform Your Security Operations And Move Beyond Legacy SIEM

Transform Your Security Operations And Move Beyond Legacy SIEM

Wednesday, November 6, 2024 at 1 PM EST

Transform Your Security Operations And Move Beyond Legacy SIEM

Wednesday, November 6, 2024 at 1 PM EST
Palo Alto Networks
5 Benefits of Autonomous Pentesting

5 Benefits of Autonomous Pentesting

Stay One Step Ahead: Unlock the Power of Autonomous Pentesting

5 Benefits of Autonomous Pentesting

Stay One Step Ahead: Unlock the Power of Autonomous Pentesting
Ironwood Cyber
Beyond C and C++: Why Rust is the Future of Command and Control Framework Development

Beyond C and C++: Why Rust is the Future of Command and Control Framework Development

Unlocking the Power of Safety and Performance: Rust’s Role in Revolutionizing Command and Control Frameworks

Beyond C and C++: Why Rust is the Future of Command and Control Framework Development

Unlocking the Power of Safety and Performance: Rust’s Role in Revolutionizing Command and Control Frameworks
Ironwood Cyber
Cyber Drills Uncover Critical Vulnerabilities in First Responder Networks

Cyber Drills Uncover Critical Vulnerabilities in First Responder Networks

Prepare, Respond, Protect: Strengthening First Responder Networks with 'Cyber Drills'

Cyber Drills Uncover Critical Vulnerabilities in First Responder Networks

Prepare, Respond, Protect: Strengthening First Responder Networks with 'Cyber Drills'
Ironwood Cyber
Maximizing Cybersecurity on a Limited Budget: Strategic Defense in a Digital World

Maximizing Cybersecurity on a Limited Budget: Strategic Defense in a Digital World

Smart Security, Tight Budgets: Defend More with Less

Maximizing Cybersecurity on a Limited Budget: Strategic Defense in a Digital World

Smart Security, Tight Budgets: Defend More with Less
Ironwood Cyber
6 Best Practices for Developer Security in a Financial Services Institution

6 Best Practices for Developer Security in a Financial Services Institution

Developer security best practices for FinServ

6 Best Practices for Developer Security in a Financial Services Institution

Developer security best practices for FinServ
Snyk
Cybersecurity Outlook 2025

Cybersecurity Outlook 2025

| Live Virtual Event | Thursday, December 5, 2024 | 11:00am - 5:00pm ET |

Cybersecurity Outlook 2025

| Live Virtual Event | Thursday, December 5, 2024 | 11:00am - 5:00pm ET |
Dark Reading
Optimizing AppSec in the Financial Services Sector

Optimizing AppSec in the Financial Services Sector

A buyer’s guide for meeting the unprecedented speed and complexity of today’s development practices

Optimizing AppSec in the Financial Services Sector

A buyer’s guide for meeting the unprecedented speed and complexity of today’s development practices
Snyk
The State of Artificial Intelligence and Machine Learning in Cybersecurity

The State of Artificial Intelligence and Machine Learning in Cybersecurity

While AI appears to be coming of age, it’s still caught in awkward adolescence. Cybersecurity and IT departments are turning to AI to help them better manage and secure their businesses -- but not without some trepidation.

The State of Artificial Intelligence and Machine Learning in Cybersecurity

While AI appears to be coming of age, it’s still caught in awkward adolescence. Cybersecurity and IT departments are turning to AI to help them better manage and secure their businesses -- but not without some trepidation.
Google Cloud
Unleashing AI to Assess Cyber Security Risk

Unleashing AI to Assess Cyber Security Risk

Tuesday, November 12, 2024 at 1 PM EST

Unleashing AI to Assess Cyber Security Risk

Tuesday, November 12, 2024 at 1 PM EST
Darktrace
Don't Get Hacked Twice: The Critical Role of Clean Backups in Cyber Resilience

Don't Get Hacked Twice: The Critical Role of Clean Backups in Cyber Resilience

In an era where cyber threats loom large, having rapid and secure recovery options is essential for sustaining business continuity and adhering to compliance standards. This webinar explores the critical importance of clean backups and introduces the innovative Cleanroom Recovery approach. Learn how these methods enable organizations to manage cyber incidents with speed and confidence.

Don't Get Hacked Twice: The Critical Role of Clean Backups in Cyber Resilience

In an era where cyber threats loom large, having rapid and secure recovery options is essential for sustaining business continuity and adhering to compliance standards. This webinar explores the critical importance of clean backups and introduces the innovative Cleanroom Recovery approach. Learn how these methods enable organizations to manage cyber incidents with speed and confidence.
Commvault
The Right Way to Use Artificial Intelligence and Machine Learning in Incident Response

The Right Way to Use Artificial Intelligence and Machine Learning in Incident Response

Wednesday, November 20, 2024 at 1 PM EDT

The Right Way to Use Artificial Intelligence and Machine Learning in Incident Response

Wednesday, November 20, 2024 at 1 PM EDT
Mandant
Why is My CEO Texting Me? Tackling Executive Impersonation & Mobile Phishing Attacks

Why is My CEO Texting Me? Tackling Executive Impersonation & Mobile Phishing Attacks

Available On-Demand

Why is My CEO Texting Me? Tackling Executive Impersonation & Mobile Phishing Attacks

Available On-Demand
Lookout
Securing Tomorrow, Today: How to Navigate Zero Trust

Securing Tomorrow, Today: How to Navigate Zero Trust

Wednesday, November 13, 2024 at 1 PM EDT

Securing Tomorrow, Today: How to Navigate Zero Trust

Wednesday, November 13, 2024 at 1 PM EDT
Blue Mantis
Social Engineering: New Tricks, New Threats, New Defenses

Social Engineering: New Tricks, New Threats, New Defenses

Tuesday, October 22, 2024 at 11 AM EDT

Social Engineering: New Tricks, New Threats, New Defenses

Tuesday, October 22, 2024 at 11 AM EDT
Google Cloud Security
Insider Risk Programs: 3 Truths and a Lie

Insider Risk Programs: 3 Truths and a Lie

Join this webinar for insights on how to go beyond cyber controls and checklists that only show what occurred without indicating why for your insider risk program from Everfox, who brings 25+ years experience of securing governments & enterprise organization insider risk programs.

Insider Risk Programs: 3 Truths and a Lie

Join this webinar for insights on how to go beyond cyber controls and checklists that only show what occurred without indicating why for your insider risk program from Everfox, who brings 25+ years experience of securing governments & enterprise organization insider risk programs.
Everfox
Top 5 Things to Know About Cyber Resilience for Network Devices

Top 5 Things to Know About Cyber Resilience for Network Devices

In today's world, cyber resilience is no longer a choice - it's a necessity. Yet, despite growing awareness of its importance, network devices remain a significant vulnerability in many organizations' defenses.

Top 5 Things to Know About Cyber Resilience for Network Devices

In today's world, cyber resilience is no longer a choice - it's a necessity. Yet, despite growing awareness of its importance, network devices remain a significant vulnerability in many organizations' defenses.
BackBox Software
Transforming Network Configuration Management: Challenges and Solutions

Transforming Network Configuration Management: Challenges and Solutions

The traditional Network Configuration Management (NCM) model is no longer fit for purpose: With hybrid networks and increasing complexity on the rise, network teams need innovative solutions to stay ahead.

Transforming Network Configuration Management: Challenges and Solutions

The traditional Network Configuration Management (NCM) model is no longer fit for purpose: With hybrid networks and increasing complexity on the rise, network teams need innovative solutions to stay ahead.
BackBox Software
When Cyber Resilience Lags IT Exploits, Automation is the Answer

When Cyber Resilience Lags IT Exploits, Automation is the Answer

Rapidly evolving cyber threats demand a proactive approach: Cyber Resilience. By prioritizing this strategic imperative, organizations can effectively mitigate risk and ensure business continuity in the face of increasing digital complexity.

When Cyber Resilience Lags IT Exploits, Automation is the Answer

Rapidly evolving cyber threats demand a proactive approach: Cyber Resilience. By prioritizing this strategic imperative, organizations can effectively mitigate risk and ensure business continuity in the face of increasing digital complexity.
BackBox Software
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.