Cybersecurity Resource Library

The #1 source for free Cybersecurity reports, whitepapers, webinars, research and more.

Showing results 31 - 60 of 920
Showing results 31 - 60 of 920

Filter by

Filters

Tracking the Untrackable: Taking a Proactive Approach to Emerging Risks

Tracking the Untrackable: Taking a Proactive Approach to Emerging Risks

Tracking the Untrackable: Taking a Proactive Approach to Emerging Risk demystifies the approaches to managing key InfoSec risk trends including cloud concentration risk and mass generative AI-related risks. This ebook explains how risk teams can overcome them through the use of connected risk technology.

Tracking the Untrackable: Taking a Proactive Approach to Emerging Risks

Tracking the Untrackable: Taking a Proactive Approach to Emerging Risk demystifies the approaches to managing key InfoSec risk trends including cloud concentration risk and mass generative AI-related risks. This ebook explains how risk teams can overcome them through the use of connected risk technology.
AuditBoard
Brand Threats Masterclass: Experts Reveal Top Attacks and Defense Tactics for 2024

Brand Threats Masterclass: Experts Reveal Top Attacks and Defense Tactics for 2024

Brand experts reveal how impersonation attacks manifest and what organizations can do to better protect against them.

Brand Threats Masterclass: Experts Reveal Top Attacks and Defense Tactics for 2024

Brand experts reveal how impersonation attacks manifest and what organizations can do to better protect against them.
Fortra
Disrupt Counterfeit Threats: A Digital Risk Protection Playbook

Disrupt Counterfeit Threats: A Digital Risk Protection Playbook

Learn how to combat online counterfeit threats that redirect sales, compromise data, and diminish brand reputation.

Disrupt Counterfeit Threats: A Digital Risk Protection Playbook

Learn how to combat online counterfeit threats that redirect sales, compromise data, and diminish brand reputation.
Fortra
Navigating Social Media Threats: A Digital Risk Protection Playbook

Navigating Social Media Threats: A Digital Risk Protection Playbook

The social media threat landscape is rapidly evolving. Learn how to identify and mitigate industry-specific threats.

Navigating Social Media Threats: A Digital Risk Protection Playbook

The social media threat landscape is rapidly evolving. Learn how to identify and mitigate industry-specific threats.
Fortra
Preventing Domain Impersonation: How to Stop Look-Alike Domains and Spoofing

Preventing Domain Impersonation: How to Stop Look-Alike Domains and Spoofing

Cybercriminals spoof domains for lucrative gains. This whitepaper examines how to protect your domains from impersonation.

Preventing Domain Impersonation: How to Stop Look-Alike Domains and Spoofing

Cybercriminals spoof domains for lucrative gains. This whitepaper examines how to protect your domains from impersonation.
Fortra
All the Ways the Internet is Surveilling You

All the Ways the Internet is Surveilling You

Thursday, July 25, 2024 at 1 PM EST

All the Ways the Internet is Surveilling You

Thursday, July 25, 2024 at 1 PM EST
Knowbe4
Next Generation Supply Chain Security

Next Generation Supply Chain Security

Thursday, July 11, 2024 at 1 PM EDT | Brought to you by Snyk

Next Generation Supply Chain Security

Thursday, July 11, 2024 at 1 PM EDT | Brought to you by Snyk
Snyk
Mind the Cyber Resilience Gap

Mind the Cyber Resilience Gap

View On-Demand

Mind the Cyber Resilience Gap

View On-Demand
Commvault
Protecting the Crown Jewels: Source Code Security

Protecting the Crown Jewels: Source Code Security

Tuesday, July 16, 2024 at 1 PM EDT | Brought to you by Mend.io

Protecting the Crown Jewels: Source Code Security

Tuesday, July 16, 2024 at 1 PM EDT | Brought to you by Mend.io
Mend.io
State of Enterprise Cloud Security

State of Enterprise Cloud Security

Rising cloud adoption trends have put organizations on high alert for a wide range of associated security issues.

State of Enterprise Cloud Security

Rising cloud adoption trends have put organizations on high alert for a wide range of associated security issues.
Google Cloud
2024 LevelBlue Futures� Report: Cyber Resilience

2024 LevelBlue Futures� Report: Cyber Resilience

Unveil Tomorrow's Security Today! Dive into the 2024 LevelBlue Futures™ Report: Cyber Resilience. Discover the secrets to strengthening your digital fortress against evolving threats. Don't just survive, thrive in the cyber age. Get your exclusive copy now!

2024 LevelBlue Futures� Report: Cyber Resilience

Unveil Tomorrow's Security Today! Dive into the 2024 LevelBlue Futures™ Report: Cyber Resilience. Discover the secrets to strengthening your digital fortress against evolving threats. Don't just survive, thrive in the cyber age. Get your exclusive copy now!
LevelBlue
LevelBlue Futures™ 2024 Report: Cyber Resilience

LevelBlue Futures™ 2024 Report: Cyber Resilience

Unveil Tomorrow's Security Today! Dive into the 2024 LevelBlue Futures™ Report: Cyber Resilience. Discover the secrets to strengthening your digital fortress against evolving threats. Don't just survive, thrive in the cyber age. Get your exclusive copy now!

LevelBlue Futures™ 2024 Report: Cyber Resilience

Unveil Tomorrow's Security Today! Dive into the 2024 LevelBlue Futures™ Report: Cyber Resilience. Discover the secrets to strengthening your digital fortress against evolving threats. Don't just survive, thrive in the cyber age. Get your exclusive copy now!
LevelBlue
Google Cloud Security Foundations for Dummies

Google Cloud Security Foundations for Dummies

The complete guide to protect everything you build and run on Google Cloud

Google Cloud Security Foundations for Dummies

The complete guide to protect everything you build and run on Google Cloud
Wiz
The Ultimate Guide for Evaluating Cloud Security Solutions

The Ultimate Guide for Evaluating Cloud Security Solutions

Everything you need to know when evaluating cloud security solutions

The Ultimate Guide for Evaluating Cloud Security Solutions

Everything you need to know when evaluating cloud security solutions
Wiz
Empowering Developers, Automating Security: The Future of AppSec

Empowering Developers, Automating Security: The Future of AppSec

Thursday, June 27, 2024 at 1 PM EDT | Brought to you by Snyk

Empowering Developers, Automating Security: The Future of AppSec

Thursday, June 27, 2024 at 1 PM EDT | Brought to you by Snyk
Snyk
A Year in Review of Zero-Days Exploited In-the-Wild in 2023

A Year in Review of Zero-Days Exploited In-the-Wild in 2023

Google observed 97 zero-day vulnerabilities exploited in-the-wild in 2023, over 50 percent more than 2022 (62 vulnerabilities). This report shares the combined analysis of Google’s Threat Analysis Group (TAG) and Mandiant and includes: trends, gaps, lessons learned, and successes across the year as a whole.

A Year in Review of Zero-Days Exploited In-the-Wild in 2023

Google observed 97 zero-day vulnerabilities exploited in-the-wild in 2023, over 50 percent more than 2022 (62 vulnerabilities). This report shares the combined analysis of Google’s Threat Analysis Group (TAG) and Mandiant and includes: trends, gaps, lessons learned, and successes across the year as a whole.
Google Cloud Security
Google Cloud Threat Horizons Report, H1 2024

Google Cloud Threat Horizons Report, H1 2024

Get insights and recommendations from cybersecurity experts in the latest edition of our Google Cloud Threat Horizons Report. Learn how you can defend your organization against emerging threats and stay ahead of threat actors’ evolving tactics.

Google Cloud Threat Horizons Report, H1 2024

Get insights and recommendations from cybersecurity experts in the latest edition of our Google Cloud Threat Horizons Report. Learn how you can defend your organization against emerging threats and stay ahead of threat actors’ evolving tactics.
Google Cloud Security
Google Threat Intelligence

Google Threat Intelligence

Google Threat Intelligence has unmatched visibility into threats enabling us to deliver detailed and timely threat intelligence to security teams around the world. With a diverse set of intelligence sources, Google is able to provide unmatched breadth and depth to this visibility.

Google Threat Intelligence

Google Threat Intelligence has unmatched visibility into threats enabling us to deliver detailed and timely threat intelligence to security teams around the world. With a diverse set of intelligence sources, Google is able to provide unmatched breadth and depth to this visibility.
Google Cloud Security
How Cyber Threat Intelligence Empowers the C-Suite

How Cyber Threat Intelligence Empowers the C-Suite

Learn how cyber threat intelligence teams who understand the relevance of risk management practices can influence C-suite executives and board members more effectively.

How Cyber Threat Intelligence Empowers the C-Suite

Learn how cyber threat intelligence teams who understand the relevance of risk management practices can influence C-suite executives and board members more effectively.
Google Cloud Security
The Forrester Wave�: External Threat Intelligence Service Providers, Q3 2023

The Forrester Wave�: External Threat Intelligence Service Providers, Q3 2023

Google was named a Leader in The Forrester Wave™: External Threat Intelligence Service Providers, Q3 2023. Forrester identified 12 top companies in the threat intelligence space and Google received the highest possible score in 15 out of the 29 criteria.

The Forrester Wave�: External Threat Intelligence Service Providers, Q3 2023

Google was named a Leader in The Forrester Wave™: External Threat Intelligence Service Providers, Q3 2023. Forrester identified 12 top companies in the threat intelligence space and Google received the highest possible score in 15 out of the 29 criteria.
Google Cloud Security
2024 Penetration Testing Report

2024 Penetration Testing Report

Offensive cybersecurity practices like pen testing stand apart from other security methods. By learning how other organizations are utilizing penetration testing, we gain valuable perspectives on the efficacy of different approaches, challenges encountered, and lessons learned. Read the report to understand the current state of pen testing practices, providing ongoing, useful data on the following key issues related to pen testing.

2024 Penetration Testing Report

Offensive cybersecurity practices like pen testing stand apart from other security methods. By learning how other organizations are utilizing penetration testing, we gain valuable perspectives on the efficacy of different approaches, challenges encountered, and lessons learned. Read the report to understand the current state of pen testing practices, providing ongoing, useful data on the following key issues related to pen testing.
Fortra
A Simple Guide to Successful Red Teaming

A Simple Guide to Successful Red Teaming

Red Teaming simulates malicious activities of a long-term adversary embedded in a network to test an organization’s ability to detect and respond to intrusions. Read the guide to learn about benefits of red teaming, use cases, and how to maximize your red team engagement

A Simple Guide to Successful Red Teaming

Red Teaming simulates malicious activities of a long-term adversary embedded in a network to test an organization’s ability to detect and respond to intrusions. Read the guide to learn about benefits of red teaming, use cases, and how to maximize your red team engagement
Fortra
Managing your Attack Surface

Managing your Attack Surface

Every point in your organization that provides access to data is what’s known as your attack surface. Your attack surface includes both digital and physical endpoints. It’s vital to understand what it is and how to protect it. Read this guide to understand the breadth of the attack surface and how organizations can effectively manage it to reduce risk.

Managing your Attack Surface

Every point in your organization that provides access to data is what’s known as your attack surface. Your attack surface includes both digital and physical endpoints. It’s vital to understand what it is and how to protect it. Read this guide to understand the breadth of the attack surface and how organizations can effectively manage it to reduce risk.
Fortra
The Complete Guide to Layering Offensive Security

The Complete Guide to Layering Offensive Security

Offensive security is when organization takes steps to actively anticipate and prevent cyberattacks instead of only reacting once an attack has occurred. The best offensive security takes a layered approach to identify vulnerabilities and exposures. Read the guide to understand how your organization can layer offensive security tactics into a holistic security strategy.

The Complete Guide to Layering Offensive Security

Offensive security is when organization takes steps to actively anticipate and prevent cyberattacks instead of only reacting once an attack has occurred. The best offensive security takes a layered approach to identify vulnerabilities and exposures. Read the guide to understand how your organization can layer offensive security tactics into a holistic security strategy.
Fortra
2024 Global Cyber Confidence Index

2024 Global Cyber Confidence Index

How confident are you in your organization’s ability to manage cyber risk?

2024 Global Cyber Confidence Index

How confident are you in your organization’s ability to manage cyber risk?
ExtraHop
Are You Ready for Ransomware?

Are You Ready for Ransomware?

Ransomware attacks are on the rise. Are you ready?

Are You Ready for Ransomware?

Ransomware attacks are on the rise. Are you ready?
ExtraHop
BAS as the Keystone of Security Validation in Multi-Layered Defense

BAS as the Keystone of Security Validation in Multi-Layered Defense

Discover how Breach and Attack Simulation (BAS) is pivotal in continuously validating security across every layer of defense, essential for adapting to the dynamic cyber threat environment.

BAS as the Keystone of Security Validation in Multi-Layered Defense

Discover how Breach and Attack Simulation (BAS) is pivotal in continuously validating security across every layer of defense, essential for adapting to the dynamic cyber threat environment.
Picus
Beyond DLP: Embracing the New Necessities of Data Security

Beyond DLP: Embracing the New Necessities of Data Security

Read the eBook to learn why DSPM is a critical component of data security programs in the age of AI, and how organizations are adapting to the changing digital landscape to secure their sensitive data.

Beyond DLP: Embracing the New Necessities of Data Security

Read the eBook to learn why DSPM is a critical component of data security programs in the age of AI, and how organizations are adapting to the changing digital landscape to secure their sensitive data.
Cyera
Case Study: How a multinational pharmaceutical company uses Cyera to improve data security and compliance

Case Study: How a multinational pharmaceutical company uses Cyera to improve data security and compliance

Download the case study to learn how a multinational pharmaceutical company uses Cyera to improve data security and compliance.

Case Study: How a multinational pharmaceutical company uses Cyera to improve data security and compliance

Download the case study to learn how a multinational pharmaceutical company uses Cyera to improve data security and compliance.
Cyera
Cloud Cost Optimization Guide

Cloud Cost Optimization Guide

CISOs must balance the competing demands of improving security, while also consolidating resources. This task is made all the more challenging by business growth which can expand attack surfaces. View this paper to examine how cloud optimization can reduce costs while improving security and compliance.

Cloud Cost Optimization Guide

CISOs must balance the competing demands of improving security, while also consolidating resources. This task is made all the more challenging by business growth which can expand attack surfaces. View this paper to examine how cloud optimization can reduce costs while improving security and compliance.
Cyera
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.