Cybersecurity Resource Library

The #1 source for free Cybersecurity reports, whitepapers, webinars, research and more.

Showing results 1 - 30 of 915
Showing results 1 - 30 of 915

Filter by

Filters

Empowering Developers, Automating Security: The Future of AppSec

Empowering Developers, Automating Security: The Future of AppSec

Thursday, June 27, 2024 at 1 PM EDT | Brought to you by Snyk

Empowering Developers, Automating Security: The Future of AppSec

Thursday, June 27, 2024 at 1 PM EDT | Brought to you by Snyk
Snyk
A Year in Review of Zero-Days Exploited In-the-Wild in 2023

A Year in Review of Zero-Days Exploited In-the-Wild in 2023

Google observed 97 zero-day vulnerabilities exploited in-the-wild in 2023, over 50 percent more than 2022 (62 vulnerabilities). This report shares the combined analysis of Google’s Threat Analysis Group (TAG) and Mandiant and includes: trends, gaps, lessons learned, and successes across the year as a whole.

A Year in Review of Zero-Days Exploited In-the-Wild in 2023

Google observed 97 zero-day vulnerabilities exploited in-the-wild in 2023, over 50 percent more than 2022 (62 vulnerabilities). This report shares the combined analysis of Google’s Threat Analysis Group (TAG) and Mandiant and includes: trends, gaps, lessons learned, and successes across the year as a whole.
Google Cloud Security
Google Cloud Threat Horizons Report, H1 2024

Google Cloud Threat Horizons Report, H1 2024

Get insights and recommendations from cybersecurity experts in the latest edition of our Google Cloud Threat Horizons Report. Learn how you can defend your organization against emerging threats and stay ahead of threat actors’ evolving tactics.

Google Cloud Threat Horizons Report, H1 2024

Get insights and recommendations from cybersecurity experts in the latest edition of our Google Cloud Threat Horizons Report. Learn how you can defend your organization against emerging threats and stay ahead of threat actors’ evolving tactics.
Google Cloud Security
Google Threat Intelligence

Google Threat Intelligence

Google Threat Intelligence has unmatched visibility into threats enabling us to deliver detailed and timely threat intelligence to security teams around the world. With a diverse set of intelligence sources, Google is able to provide unmatched breadth and depth to this visibility.

Google Threat Intelligence

Google Threat Intelligence has unmatched visibility into threats enabling us to deliver detailed and timely threat intelligence to security teams around the world. With a diverse set of intelligence sources, Google is able to provide unmatched breadth and depth to this visibility.
Google Cloud Security
How Cyber Threat Intelligence Empowers the C-Suite

How Cyber Threat Intelligence Empowers the C-Suite

Learn how cyber threat intelligence teams who understand the relevance of risk management practices can influence C-suite executives and board members more effectively.

How Cyber Threat Intelligence Empowers the C-Suite

Learn how cyber threat intelligence teams who understand the relevance of risk management practices can influence C-suite executives and board members more effectively.
Google Cloud Security
The Forrester Wave™: External Threat Intelligence Service Providers, Q3 2023

The Forrester Wave™: External Threat Intelligence Service Providers, Q3 2023

Google was named a Leader in The Forrester Wave™: External Threat Intelligence Service Providers, Q3 2023. Forrester identified 12 top companies in the threat intelligence space and Google received the highest possible score in 15 out of the 29 criteria.

The Forrester Wave™: External Threat Intelligence Service Providers, Q3 2023

Google was named a Leader in The Forrester Wave™: External Threat Intelligence Service Providers, Q3 2023. Forrester identified 12 top companies in the threat intelligence space and Google received the highest possible score in 15 out of the 29 criteria.
Google Cloud Security
2024 Penetration Testing Report

2024 Penetration Testing Report

Offensive cybersecurity practices like pen testing stand apart from other security methods. By learning how other organizations are utilizing penetration testing, we gain valuable perspectives on the efficacy of different approaches, challenges encountered, and lessons learned. Read the report to understand the current state of pen testing practices, providing ongoing, useful data on the following key issues related to pen testing.

2024 Penetration Testing Report

Offensive cybersecurity practices like pen testing stand apart from other security methods. By learning how other organizations are utilizing penetration testing, we gain valuable perspectives on the efficacy of different approaches, challenges encountered, and lessons learned. Read the report to understand the current state of pen testing practices, providing ongoing, useful data on the following key issues related to pen testing.
Fortra
A Simple Guide to Successful Red Teaming

A Simple Guide to Successful Red Teaming

Red Teaming simulates malicious activities of a long-term adversary embedded in a network to test an organization’s ability to detect and respond to intrusions. Read the guide to learn about benefits of red teaming, use cases, and how to maximize your red team engagement

A Simple Guide to Successful Red Teaming

Red Teaming simulates malicious activities of a long-term adversary embedded in a network to test an organization’s ability to detect and respond to intrusions. Read the guide to learn about benefits of red teaming, use cases, and how to maximize your red team engagement
Fortra
Managing your Attack Surface

Managing your Attack Surface

Every point in your organization that provides access to data is what’s known as your attack surface. Your attack surface includes both digital and physical endpoints. It’s vital to understand what it is and how to protect it. Read this guide to understand the breadth of the attack surface and how organizations can effectively manage it to reduce risk.

Managing your Attack Surface

Every point in your organization that provides access to data is what’s known as your attack surface. Your attack surface includes both digital and physical endpoints. It’s vital to understand what it is and how to protect it. Read this guide to understand the breadth of the attack surface and how organizations can effectively manage it to reduce risk.
Fortra
The Complete Guide to Layering Offensive Security

The Complete Guide to Layering Offensive Security

Offensive security is when organization takes steps to actively anticipate and prevent cyberattacks instead of only reacting once an attack has occurred. The best offensive security takes a layered approach to identify vulnerabilities and exposures. Read the guide to understand how your organization can layer offensive security tactics into a holistic security strategy.

The Complete Guide to Layering Offensive Security

Offensive security is when organization takes steps to actively anticipate and prevent cyberattacks instead of only reacting once an attack has occurred. The best offensive security takes a layered approach to identify vulnerabilities and exposures. Read the guide to understand how your organization can layer offensive security tactics into a holistic security strategy.
Fortra
2024 Global Cyber Confidence Index

2024 Global Cyber Confidence Index

How confident are you in your organization’s ability to manage cyber risk?

2024 Global Cyber Confidence Index

How confident are you in your organization’s ability to manage cyber risk?
ExtraHop
Are You Ready for Ransomware?

Are You Ready for Ransomware?

Ransomware attacks are on the rise. Are you ready?

Are You Ready for Ransomware?

Ransomware attacks are on the rise. Are you ready?
ExtraHop
Beyond DLP: Embracing the New Necessities of Data Security

Beyond DLP: Embracing the New Necessities of Data Security

Read the eBook to learn why DSPM is a critical component of data security programs in the age of AI, and how organizations are adapting to the changing digital landscape to secure their sensitive data.

Beyond DLP: Embracing the New Necessities of Data Security

Read the eBook to learn why DSPM is a critical component of data security programs in the age of AI, and how organizations are adapting to the changing digital landscape to secure their sensitive data.
Cyera
Breach and Attack Simulation vs. Traditional Assessment Methods

Breach and Attack Simulation vs. Traditional Assessment Methods

Explore the clear advantages of BAS vs. red teaming, vulnerability management, and automated penetration testing; plus, why it emerges as the top method to drive security validation and CTEM efforts.

Breach and Attack Simulation vs. Traditional Assessment Methods

Explore the clear advantages of BAS vs. red teaming, vulnerability management, and automated penetration testing; plus, why it emerges as the top method to drive security validation and CTEM efforts.
Picus
Case Study: How a multinational pharmaceutical company uses Cyera to improve data security and compliance

Case Study: How a multinational pharmaceutical company uses Cyera to improve data security and compliance

Download the case study to learn how a multinational pharmaceutical company uses Cyera to improve data security and compliance.

Case Study: How a multinational pharmaceutical company uses Cyera to improve data security and compliance

Download the case study to learn how a multinational pharmaceutical company uses Cyera to improve data security and compliance.
Cyera
Cloud Cost Optimization Guide

Cloud Cost Optimization Guide

CISOs must balance the competing demands of improving security, while also consolidating resources. This task is made all the more challenging by business growth which can expand attack surfaces. View this paper to examine how cloud optimization can reduce costs while improving security and compliance.

Cloud Cost Optimization Guide

CISOs must balance the competing demands of improving security, while also consolidating resources. This task is made all the more challenging by business growth which can expand attack surfaces. View this paper to examine how cloud optimization can reduce costs while improving security and compliance.
Cyera
Double Your Threat Blocking in 90 Days

Double Your Threat Blocking in 90 Days

Learn how Breach and Attack Simulation optimizes your prevention and detection controls - enabling you to block twice as many threats in just your first 90 days.

Double Your Threat Blocking in 90 Days

Learn how Breach and Attack Simulation optimizes your prevention and detection controls - enabling you to block twice as many threats in just your first 90 days.
Picus
DSPM Buyer's Guide

DSPM Buyer's Guide

Download the DSPM Buyer's Guide to learn what to look for in a DSPM solution, key considerations when evaluating DSPM solutions, and how to spot a legacy approach claiming "DSPM".

DSPM Buyer's Guide

Download the DSPM Buyer's Guide to learn what to look for in a DSPM solution, key considerations when evaluating DSPM solutions, and how to spot a legacy approach claiming "DSPM".
Cyera
How Breach and Attack Simulation Fits Into a Multi-layered Defense Strategy

How Breach and Attack Simulation Fits Into a Multi-layered Defense Strategy

Discover why Breach and Attack Simulation is critical for security validation and strengthening each layer of a multi-layered defense architecture.

How Breach and Attack Simulation Fits Into a Multi-layered Defense Strategy

Discover why Breach and Attack Simulation is critical for security validation and strengthening each layer of a multi-layered defense architecture.
Picus
How to Overcome Common DLP Challenges with Cyera's AI-Powered Data Security Platform

How to Overcome Common DLP Challenges with Cyera's AI-Powered Data Security Platform

Learn why traditional DLP tools lack an accurate data foundation, why it's getting harder to trust traditional DLP solutions, and how to choose a data security platform that will complement your existing systems and tools.

How to Overcome Common DLP Challenges with Cyera's AI-Powered Data Security Platform

Learn why traditional DLP tools lack an accurate data foundation, why it's getting harder to trust traditional DLP solutions, and how to choose a data security platform that will complement your existing systems and tools.
Cyera
Ridge Security's AI-Driven Security Validation Gives Unparalleled Power to Cyber Defenders

Ridge Security's AI-Driven Security Validation Gives Unparalleled Power to Cyber Defenders

As organizations face evolving threats, integrating AI into cybersecurity brings an intelligent, iterative, and continuous learning force with unparalleled opportunities to enhance defense mechanisms, streamline processes, and mitigate risks more effectively.

Ridge Security's AI-Driven Security Validation Gives Unparalleled Power to Cyber Defenders

As organizations face evolving threats, integrating AI into cybersecurity brings an intelligent, iterative, and continuous learning force with unparalleled opportunities to enhance defense mechanisms, streamline processes, and mitigate risks more effectively.
Ridge Security
The Dangers of Cyber Risk Quantification

The Dangers of Cyber Risk Quantification

Reporting on cyber risk can get risky. Three current and former CISOs share their experiences.

The Dangers of Cyber Risk Quantification

Reporting on cyber risk can get risky. Three current and former CISOs share their experiences.
ExtraHop
The How to Survive the Ransomware Rampage

The How to Survive the Ransomware Rampage

Several trends are fueling the rapid rise in both frequency and size of cyberattacks. Threat actors are also adjusting their playbook for higher-impact targets to gain larger and more assured payouts. Harden your assets against Ransomware today.

The How to Survive the Ransomware Rampage

Several trends are fueling the rapid rise in both frequency and size of cyberattacks. Threat actors are also adjusting their playbook for higher-impact targets to gain larger and more assured payouts. Harden your assets against Ransomware today.
Ridge Security
The State of Threat Exposure Management

The State of Threat Exposure Management

Learn about the four 'impossible' tradeoffs security teams are making and how to navigate these with Continuous Threat Exposure Management.

The State of Threat Exposure Management

Learn about the four 'impossible' tradeoffs security teams are making and how to navigate these with Continuous Threat Exposure Management.
Picus
The True Cost of a Security Breach

The True Cost of a Security Breach

Can your organization afford a data breach?

The True Cost of a Security Breach

Can your organization afford a data breach?
ExtraHop
Unlock External Exposure Management with Ridge Security

Unlock External Exposure Management with Ridge Security

Managed Security Service Providers (MSSP) and Managed Detection and Response (MDR) providers are building out adjacent service capabilities to help customers manage this increasingly complex and distributed landscape. Ridge Security’s MSSP program is designed to help you achieve these business benefits with award-winning tools, targeted exposure management capabilities and easy API integration.

Unlock External Exposure Management with Ridge Security

Managed Security Service Providers (MSSP) and Managed Detection and Response (MDR) providers are building out adjacent service capabilities to help customers manage this increasingly complex and distributed landscape. Ridge Security’s MSSP program is designed to help you achieve these business benefits with award-winning tools, targeted exposure management capabilities and easy API integration.
Ridge Security
Cutting Through the AI Hype: Practical Strategies for Real-World Cybersecurity Success

Cutting Through the AI Hype: Practical Strategies for Real-World Cybersecurity Success

Wednesday, July 17, 2024; at 1 PM EDT | Brought to you by Sophos

Cutting Through the AI Hype: Practical Strategies for Real-World Cybersecurity Success

Wednesday, July 17, 2024; at 1 PM EDT | Brought to you by Sophos
Sophos Inc.
Effective Asset Management Is Critical to Enterprise Cybersecurity

Effective Asset Management Is Critical to Enterprise Cybersecurity

An enterprise cannot protect the business without knowing what devices and software it has -- on-premises, cloud, and spaces in between -- yet few organizations have effective asset management in place. Organizations need to take a holistic approach with automated discovery tools, robust data management processes, governance frameworks, and collaboration across teams. This report discusses how to set up asset management programs that help reduce risk and maintain a secure digital footprint.

Effective Asset Management Is Critical to Enterprise Cybersecurity

An enterprise cannot protect the business without knowing what devices and software it has -- on-premises, cloud, and spaces in between -- yet few organizations have effective asset management in place. Organizations need to take a holistic approach with automated discovery tools, robust data management processes, governance frameworks, and collaboration across teams. This report discusses how to set up asset management programs that help reduce risk and maintain a secure digital footprint.
Panaseer
Gigamon CISO Series: Analyst Research on Supercharging Observability and AIOps with Network Telemetry

Gigamon CISO Series: Analyst Research on Supercharging Observability and AIOps with Network Telemetry

Available On-Demand

Gigamon CISO Series: Analyst Research on Supercharging Observability and AIOps with Network Telemetry

Available On-Demand
Gigamon
How to Use Threat Intelligence to Mitigate Third Party Risk

How to Use Threat Intelligence to Mitigate Third Party Risk

Wednesday, July 10, 2024 at 1 PM EDT | Brought to you by Cyble

How to Use Threat Intelligence to Mitigate Third Party Risk

Wednesday, July 10, 2024 at 1 PM EDT | Brought to you by Cyble
Cyble
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.