Cybersecurity Resource Library

The #1 source for free Cybersecurity reports, whitepapers, webinars, research and more.

Showing results 1 - 30 of 1023
Showing results 1 - 30 of 1023

Filter by

Filters

A Comparison of Automated Sign-On Options for the Mainframe

A Comparison of Automated Sign-On Options for the Mainframe

The mighty mainframe is not a computing dinosaur. This powerful, high-volume machine still runs much of the corporate world’s most mission-critical applications. In other words, it’s not going away anytime soon. The problem is that many mainframe applications, some written decades ago, are hard-coded to handle weak case-insensitive passwords with just eight characters. That was fine back in the day, but not anymore.

A Comparison of Automated Sign-On Options for the Mainframe

The mighty mainframe is not a computing dinosaur. This powerful, high-volume machine still runs much of the corporate world’s most mission-critical applications. In other words, it’s not going away anytime soon. The problem is that many mainframe applications, some written decades ago, are hard-coded to handle weak case-insensitive passwords with just eight characters. That was fine back in the day, but not anymore.
Rocket Software
A New Approach to Mainframe Passwords: Get Rid of Them

A New Approach to Mainframe Passwords: Get Rid of Them

Passwords are also a corporate menace. Creating, remembering, and constantly changing passwords puts a burden on users.

A New Approach to Mainframe Passwords: Get Rid of Them

Passwords are also a corporate menace. Creating, remembering, and constantly changing passwords puts a burden on users.
Rocket Software
From Green Screen to Red Alert: Fortifying Your Mainframe Security

From Green Screen to Red Alert: Fortifying Your Mainframe Security

How to arm green screens against rogue AI, fake IT workers, and expensive auditory

From Green Screen to Red Alert: Fortifying Your Mainframe Security

How to arm green screens against rogue AI, fake IT workers, and expensive auditory
Rocket Software
Integrating Host Systems with Modern Security Frameworks

Integrating Host Systems with Modern Security Frameworks

The world has changed around your host systems. Today, these enterprise workhorses -- rich with decades of data -- don’t fit into your modern security framework.

Integrating Host Systems with Modern Security Frameworks

The world has changed around your host systems. Today, these enterprise workhorses -- rich with decades of data -- don’t fit into your modern security framework.
Rocket Software
Shift Left: Integrating Security into the Software Development Lifecycle

Shift Left: Integrating Security into the Software Development Lifecycle

Wednesday, March 5, 2025 at 1 PM EST

Shift Left: Integrating Security into the Software Development Lifecycle

Wednesday, March 5, 2025 at 1 PM EST
Snyk
Think Your Mainframe Is Secure? Think Again.

Think Your Mainframe Is Secure? Think Again.

91% of all cyber attacks begin with phishing

Think Your Mainframe Is Secure? Think Again.

91% of all cyber attacks begin with phishing
Rocket Software
Whitepaper: DevSecOps is dead...or is it?

Whitepaper: DevSecOps is dead...or is it?

Many organizations still find it challenging to effectively implement and meaningfully integrate security into rapid, agile DevOps practices. Dive into Snyk’s six pillars for success and how we arrived here in the first place.

Whitepaper: DevSecOps is dead...or is it?

Many organizations still find it challenging to effectively implement and meaningfully integrate security into rapid, agile DevOps practices. Dive into Snyk’s six pillars for success and how we arrived here in the first place.
Snyk
Zero to hero: A blueprint for establishing a security champions program

Zero to hero: A blueprint for establishing a security champions program

Security champions programs are a proven method for scaling security across large development teams. Snyk met with security leaders around the globe to compile the ultimate blueprint to building, implementing, and scaling a security champions program.

Zero to hero: A blueprint for establishing a security champions program

Security champions programs are a proven method for scaling security across large development teams. Snyk met with security leaders around the globe to compile the ultimate blueprint to building, implementing, and scaling a security champions program.
Snyk
Cyera Breach Readiness | Service Datasheet

Cyera Breach Readiness | Service Datasheet

Leverage and retain a team of elite cybersecurity practitioners from Cyera to evaluate and respond to data security incidents post breach, helping you identify data security risks, remove ambiguity related to materiality, and determine the fastest path to recovery.

Cyera Breach Readiness | Service Datasheet

Leverage and retain a team of elite cybersecurity practitioners from Cyera to evaluate and respond to data security incidents post breach, helping you identify data security risks, remove ambiguity related to materiality, and determine the fastest path to recovery.
Cyera
Securing Business Data In the Age of AI with Cyera

Securing Business Data In the Age of AI with Cyera

Data is the fuel that drives growth and efficiency for every business- enabling businesses to innovate, transform to cloud, and unlock AI for business. According to Gartner's 2025 Finance Executive Priorities Survey, data, metrics and analytics are the number one priority for Chief Financial Officers. It also found that 75% of CFOs are responsible for enterprise-wide data and analytics. Check out this eBook to learn more.

Securing Business Data In the Age of AI with Cyera

Data is the fuel that drives growth and efficiency for every business- enabling businesses to innovate, transform to cloud, and unlock AI for business. According to Gartner's 2025 Finance Executive Priorities Survey, data, metrics and analytics are the number one priority for Chief Financial Officers. It also found that 75% of CFOs are responsible for enterprise-wide data and analytics. Check out this eBook to learn more.
Cyera
Securing the Remote Workforce

Securing the Remote Workforce

Thursday, February 20, 2025 at 1 PM EDT

Securing the Remote Workforce

Thursday, February 20, 2025 at 1 PM EDT
Palo Alto Networks
The 2024 DSPM Adoption Report

The 2024 DSPM Adoption Report

This 2024 DSPM Adoption Report is based on a comprehensive survey of 637 IT and cybersecurity professionals that reveals how organizations are approaching DSPM, the challenges they face, the effectiveness of their current solutions, and their adoption plan over the next 12 months. Through this survey, we uncover the critical needs and priorities of enterprises when it comes to securing their data across various environments.

The 2024 DSPM Adoption Report

This 2024 DSPM Adoption Report is based on a comprehensive survey of 637 IT and cybersecurity professionals that reveals how organizations are approaching DSPM, the challenges they face, the effectiveness of their current solutions, and their adoption plan over the next 12 months. Through this survey, we uncover the critical needs and priorities of enterprises when it comes to securing their data across various environments.
Cyera
Why DSPM is Core to Every Enterprise Data Security Program

Why DSPM is Core to Every Enterprise Data Security Program

Data Security Posture Management (DSPM) gives you the visibility and insights to safeguard your data and reduce risks effectively. This eBook highlights why DSPM is vital for modern data security programs and how it works with the security solutions you already have in place.

Why DSPM is Core to Every Enterprise Data Security Program

Data Security Posture Management (DSPM) gives you the visibility and insights to safeguard your data and reduce risks effectively. This eBook highlights why DSPM is vital for modern data security programs and how it works with the security solutions you already have in place.
Cyera
2025 Outlook for Security and Telemetry Data

2025 Outlook for Security and Telemetry Data

Unlock the Future of Telemetry Data and Security in 2025 The digital landscape is evolving at breakneck speed, presenting both challenges and opportunities for IT, Security, and Compliance teams. Are you ready for what’s next?

2025 Outlook for Security and Telemetry Data

Unlock the Future of Telemetry Data and Security in 2025 The digital landscape is evolving at breakneck speed, presenting both challenges and opportunities for IT, Security, and Compliance teams. Are you ready for what’s next?
Cribl
How to survive Cloud Migration

How to survive Cloud Migration

Migrating to the cloud offers cost efficiency and agility, but focusing solely on BI data while neglecting IT and Security planning can lead to security gaps, compliance issues, and costly downtime. Discover how to navigate IT and Security data challenges for a smoother, safer transition.

How to survive Cloud Migration

Migrating to the cloud offers cost efficiency and agility, but focusing solely on BI data while neglecting IT and Security planning can lead to security gaps, compliance issues, and costly downtime. Discover how to navigate IT and Security data challenges for a smoother, safer transition.
Cribl
Navigating the future of IT and Security Data Management

Navigating the future of IT and Security Data Management

The escalating data challenges faced by IT and security teams won’t be resolved with legacy approaches, or with new tools built on outmoded data infrastructure. Read how adopting a composable data infrastructure designed for the unique and diverse needs of today’s IT and security teams, organizations can navigate this data storm efficiently.

Navigating the future of IT and Security Data Management

The escalating data challenges faced by IT and security teams won’t be resolved with legacy approaches, or with new tools built on outmoded data infrastructure. Read how adopting a composable data infrastructure designed for the unique and diverse needs of today’s IT and security teams, organizations can navigate this data storm efficiently.
Cribl
The State of the SIEM Market with Cribl and Crowdstrike

The State of the SIEM Market with Cribl and Crowdstrike

Legacy SIEMs are falling behind. As data floods in from every corner of your environment, bottlenecks, high costs, and security gaps hold security teams back from detecting and responding to threats in real time. Learn about some of the latest trends in the market and how companies like CrowdStrike and Cribl are reshaping the landscape with seamless data routing, high-fidelity detection, and automated response.

The State of the SIEM Market with Cribl and Crowdstrike

Legacy SIEMs are falling behind. As data floods in from every corner of your environment, bottlenecks, high costs, and security gaps hold security teams back from detecting and responding to threats in real time. Learn about some of the latest trends in the market and how companies like CrowdStrike and Cribl are reshaping the landscape with seamless data routing, high-fidelity detection, and automated response.
Cribl
EDR, SIEM, SOAR, and MORE: How to Determine the Right Endpoint Strategy for Your Enterprise

EDR, SIEM, SOAR, and MORE: How to Determine the Right Endpoint Strategy for Your Enterprise

Wednesday, March 19, 2025 at 1 PM EST

EDR, SIEM, SOAR, and MORE: How to Determine the Right Endpoint Strategy for Your Enterprise

Wednesday, March 19, 2025 at 1 PM EST
Palo Alto
Where Does Outsourcing Make Sense for Your Organization?

Where Does Outsourcing Make Sense for Your Organization?

Thursday, February 27, 2025 at 1 PM EDT

Where Does Outsourcing Make Sense for Your Organization?

Thursday, February 27, 2025 at 1 PM EDT
Calian
Uncovering Threats to Your Mainframe & How to Keep Host Access Secure

Uncovering Threats to Your Mainframe & How to Keep Host Access Secure

Thursday, February 13, 2025 at 1 PM EDT

Uncovering Threats to Your Mainframe & How to Keep Host Access Secure

Thursday, February 13, 2025 at 1 PM EDT
Rocket Software
60 Facts to Know For the Modern CISO

60 Facts to Know For the Modern CISO

Find out why 60% of organizations lack confidence in their defenses and how you can break the cycle. The Big CISO Factbook is your essential guide to overcoming today's most pressing security challenges.

60 Facts to Know For the Modern CISO

Find out why 60% of organizations lack confidence in their defenses and how you can break the cycle. The Big CISO Factbook is your essential guide to overcoming today's most pressing security challenges.
GYTPOL
A Gap Analysis of Endpoint Configuration Security

A Gap Analysis of Endpoint Configuration Security

Every year, over 4,000 ransomware attacks take advantage of device misconfigurations. Hackers exploit these security gaps to gain easy access and move laterally. Proactive protection demands smart, well-maintained configurations. Most organization fall short. Are you among them?

A Gap Analysis of Endpoint Configuration Security

Every year, over 4,000 ransomware attacks take advantage of device misconfigurations. Hackers exploit these security gaps to gain easy access and move laterally. Proactive protection demands smart, well-maintained configurations. Most organization fall short. Are you among them?
GYTPOL
The Security Team's Guide to Reducing SIEM Costs

The Security Team's Guide to Reducing SIEM Costs

Available On-Demand

The Security Team's Guide to Reducing SIEM Costs

Available On-Demand
Chronosphere
4 Best Practices for Hybrid Security Policy Management

4 Best Practices for Hybrid Security Policy Management

Networks are evolving and your network security is getting more complex. Download this white paper to explore the challenges of managing security policies across hybrid infrastructures and four best practices to overcome these challenges.

4 Best Practices for Hybrid Security Policy Management

Networks are evolving and your network security is getting more complex. Download this white paper to explore the challenges of managing security policies across hybrid infrastructures and four best practices to overcome these challenges.
Tufin
How CISOs Navigate the Regulatory and Compliance Maze

How CISOs Navigate the Regulatory and Compliance Maze

Wednesday, February 26, 2025 at 1 PM EST

How CISOs Navigate the Regulatory and Compliance Maze

Wednesday, February 26, 2025 at 1 PM EST
Black Duck Software
The State of Firewall Security: Challenges, Risks, and Solutions for Modern Networks

The State of Firewall Security: Challenges, Risks, and Solutions for Modern Networks

The Evolving Landscape of Network Security in 2025

The State of Firewall Security: Challenges, Risks, and Solutions for Modern Networks

The Evolving Landscape of Network Security in 2025
Tufin
Tips on Managing Cloud Security in a Hybrid Environment

Tips on Managing Cloud Security in a Hybrid Environment

Wednesday, January 29, 2025 at 1 PM EDT

Tips on Managing Cloud Security in a Hybrid Environment

Wednesday, January 29, 2025 at 1 PM EDT
CyberArk Software
How to Use AI for Security Good

How to Use AI for Security Good

| Special Keynote | Thursday, January 30, 2025| 2:00pm ET | Cybersecurity Outlook 2025 Virtual Event | Dark Reading and Omdia

How to Use AI for Security Good

| Special Keynote | Thursday, January 30, 2025| 2:00pm ET | Cybersecurity Outlook 2025 Virtual Event | Dark Reading and Omdia
Dark Reading
The Pragmatic CISO's New Year's Resolutions for 2025

The Pragmatic CISO's New Year's Resolutions for 2025

| Special Keynote | Thursday, January 30, 2025 | 1:00pm ET | Cybersecurity Outlook 2025 Virtual Event | Dark Reading and Omdia

The Pragmatic CISO's New Year's Resolutions for 2025

| Special Keynote | Thursday, January 30, 2025 | 1:00pm ET | Cybersecurity Outlook 2025 Virtual Event | Dark Reading and Omdia
Dark Reading
Shifting Left: DevSecOps in the Cloud

Shifting Left: DevSecOps in the Cloud

Tuesday, February 4, 2025 at 1 PM EST

Shifting Left: DevSecOps in the Cloud

Tuesday, February 4, 2025 at 1 PM EST
Wiz
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.