Cybersecurity Resource Library

The #1 source for free Cybersecurity reports, whitepapers, webinars, research and more.

Showing results 31 - 60 of 1023
Showing results 31 - 60 of 1023

Filter by

Filters

Social Engineering: New Tricks, New Threats, New Defenses

Social Engineering: New Tricks, New Threats, New Defenses

This is an executive summary of the “Social Engineering: New Tricks, New Threats, New Defenses” webinar that took place October 22, 2024. The speaker was Yihao Lim, Lead Threat Intelligence Advisor, Google Cloud Security. The webinar was moderated by Peter Krass, editor at Dark Reading.

Social Engineering: New Tricks, New Threats, New Defenses

This is an executive summary of the “Social Engineering: New Tricks, New Threats, New Defenses” webinar that took place October 22, 2024. The speaker was Yihao Lim, Lead Threat Intelligence Advisor, Google Cloud Security. The webinar was moderated by Peter Krass, editor at Dark Reading.
Google Cloud Security
Understanding Social Engineering Attacks and What To Do About Them

Understanding Social Engineering Attacks and What To Do About Them

Social engineering attacks are getting more sophisticated. This just-released Dark Reading report examines the latest social engineering threats and defenses. Enterprise security teams are adapting to the latest threats with multi-layered defense and improved training.

Understanding Social Engineering Attacks and What To Do About Them

Social engineering attacks are getting more sophisticated. This just-released Dark Reading report examines the latest social engineering threats and defenses. Enterprise security teams are adapting to the latest threats with multi-layered defense and improved training.
Google Cloud Security
DSPM Buyer's Guide

DSPM Buyer's Guide

DSPM and DDR are emerging technologies that many vendors claim to offer. However, the lack of sufficient analyst research and customer testimonials around these technologies makes them hard to evaluate. This guide provides a framework for security leaders to evaluate DSPM and DDR technologies, based on the challenges you are looking to address.

DSPM Buyer's Guide

DSPM and DDR are emerging technologies that many vendors claim to offer. However, the lack of sufficient analyst research and customer testimonials around these technologies makes them hard to evaluate. This guide provides a framework for security leaders to evaluate DSPM and DDR technologies, based on the challenges you are looking to address.
Cyera
ASRM Cyberisk

ASRM Cyberisk

Getting under the surface of your Cyber Risk

ASRM Cyberisk

Getting under the surface of your Cyber Risk
Trend Micro, Inc.
ASRM Use Case Risk Prioritization

ASRM Use Case Risk Prioritization

Elevate Your Risk Prioritization & Mitigation

ASRM Use Case Risk Prioritization

Elevate Your Risk Prioritization & Mitigation
Trend Micro, Inc.
IDC Tech Assessment Guide ASRM

IDC Tech Assessment Guide ASRM

Across the Entire Attack Surface: Risk Requires a Platform

IDC Tech Assessment Guide ASRM

Across the Entire Attack Surface: Risk Requires a Platform
Trend Micro, Inc.
Omdia ASM eBook

Omdia ASM eBook

Understanding ASM in the context of Continuous Security Protection

Omdia ASM eBook

Understanding ASM in the context of Continuous Security Protection
Trend Micro, Inc.
Top 5 Things to Know About Cyber Resilience for Network Devices

Top 5 Things to Know About Cyber Resilience for Network Devices

In today's world, cyber resilience is no longer a choice - it's a necessity. Yet, despite growing awareness of its importance, network devices remain a significant vulnerability in many organizations' defenses.

Top 5 Things to Know About Cyber Resilience for Network Devices

In today's world, cyber resilience is no longer a choice - it's a necessity. Yet, despite growing awareness of its importance, network devices remain a significant vulnerability in many organizations' defenses.
BackBox Software
Transforming Network Configuration Management: Challenges and Solutions

Transforming Network Configuration Management: Challenges and Solutions

The traditional Network Configuration Management (NCM) model is no longer fit for purpose: With hybrid networks and increasing complexity on the rise, network teams need innovative solutions to stay ahead.

Transforming Network Configuration Management: Challenges and Solutions

The traditional Network Configuration Management (NCM) model is no longer fit for purpose: With hybrid networks and increasing complexity on the rise, network teams need innovative solutions to stay ahead.
BackBox Software
When Cyber Resilience Lags IT Exploits, Automation is the Answer

When Cyber Resilience Lags IT Exploits, Automation is the Answer

Rapidly evolving cyber threats demand a proactive approach: Cyber Resilience. By prioritizing this strategic imperative, organizations can effectively mitigate risk and ensure business continuity in the face of increasing digital complexity.

When Cyber Resilience Lags IT Exploits, Automation is the Answer

Rapidly evolving cyber threats demand a proactive approach: Cyber Resilience. By prioritizing this strategic imperative, organizations can effectively mitigate risk and ensure business continuity in the face of increasing digital complexity.
BackBox Software
Fireside Chat with Graham Cluley: Known and Unknown Risks of AI Adoption in 2025

Fireside Chat with Graham Cluley: Known and Unknown Risks of AI Adoption in 2025

Wednesday, January 15, 2025 at 1 PM EST

Fireside Chat with Graham Cluley: Known and Unknown Risks of AI Adoption in 2025

Wednesday, January 15, 2025 at 1 PM EST
Rubrik
From Reactive to Proactive: How Allowlisting Turns the Tables on Zero-Day Vulnerabilities

From Reactive to Proactive: How Allowlisting Turns the Tables on Zero-Day Vulnerabilities

This is an executive summary of the “From Reactive to Proactive: How Allowlisting Turns the Tables on Zero-Day Vulnerabilities” webinar that took place October 17th, 2024. The speaker was Rob Allen, Chief Product Officer (CPO), ThreatLocker. The webinar was moderated Jonathan Care, Advisor, Lionfish Tech Advisors (Moderator)

From Reactive to Proactive: How Allowlisting Turns the Tables on Zero-Day Vulnerabilities

This is an executive summary of the “From Reactive to Proactive: How Allowlisting Turns the Tables on Zero-Day Vulnerabilities” webinar that took place October 17th, 2024. The speaker was Rob Allen, Chief Product Officer (CPO), ThreatLocker. The webinar was moderated Jonathan Care, Advisor, Lionfish Tech Advisors (Moderator)
ThreatLocker
100 Critical Security Questions to Address in Your Trust Center

100 Critical Security Questions to Address in Your Trust Center

We analyzed data from hundreds of SafeBase Trust Centers across industries to uncover the top 100 core questions most frequently asked in security reviews.

100 Critical Security Questions to Address in Your Trust Center

We analyzed data from hundreds of SafeBase Trust Centers across industries to uncover the top 100 core questions most frequently asked in security reviews.
SafeBase
The Artificial Future Trend Micro Security Predictions for 2025

The Artificial Future Trend Micro Security Predictions for 2025

Thursday, January 16, 2025 at 1 PM EST

The Artificial Future Trend Micro Security Predictions for 2025

Thursday, January 16, 2025 at 1 PM EST
Trend Micro
Transform Security Reviews and Build Lasting Customer Confidence with a Trust Center

Transform Security Reviews and Build Lasting Customer Confidence with a Trust Center

We looked at SafeBase Trust Centers from over 800 leading companies to identify foundational components every CISO should embed into their own infrastructure as well as blind spots to anticipate in this best practices guide.

Transform Security Reviews and Build Lasting Customer Confidence with a Trust Center

We looked at SafeBase Trust Centers from over 800 leading companies to identify foundational components every CISO should embed into their own infrastructure as well as blind spots to anticipate in this best practices guide.
SafeBase
What Issues and Challenges Cybersecurity Pros Care About

What Issues and Challenges Cybersecurity Pros Care About

Cybersecurity professionals are navigating a complex landscape of modern threats. This just-released Dark Reading report examines the perspectives of cybersecurity professionals regarding the bigget issues and challenges they are facing today. Findings indicate concerns about social engineering, AI, and the evolving threats are keeping them awake at night.

What Issues and Challenges Cybersecurity Pros Care About

Cybersecurity professionals are navigating a complex landscape of modern threats. This just-released Dark Reading report examines the perspectives of cybersecurity professionals regarding the bigget issues and challenges they are facing today. Findings indicate concerns about social engineering, AI, and the evolving threats are keeping them awake at night.
ThreatLocker
Taking the Uncertainty Out of Cyber Recovery for Nutanix AHV Environments

Taking the Uncertainty Out of Cyber Recovery for Nutanix AHV Environments

Available On-Demand

Taking the Uncertainty Out of Cyber Recovery for Nutanix AHV Environments

Available On-Demand
Rubrik
A CISO's Guide to Geopolitics and CyberSecurity

A CISO's Guide to Geopolitics and CyberSecurity

Geopolitical strain has escalated into cyberwarefare. CISOs need to know how to not only respond to such attacks, but prevent them.

A CISO's Guide to Geopolitics and CyberSecurity

Geopolitical strain has escalated into cyberwarefare. CISOs need to know how to not only respond to such attacks, but prevent them.
ExtraHop
Evolve Your Ransomware Defense

Evolve Your Ransomware Defense

Outsmart Ransomware: Discover How RevealX's Full Network Visibility Can Slash Detection Times and Boost Your ROI by 193%

Evolve Your Ransomware Defense

Outsmart Ransomware: Discover How RevealX's Full Network Visibility Can Slash Detection Times and Boost Your ROI by 193%
ExtraHop
RevealX Catches Ransomware Within Days of Deployment at Wood County Hospital

RevealX Catches Ransomware Within Days of Deployment at Wood County Hospital

The landscape of ransomware attacks is rapidly evolving. Learn how ExtraHop Reveal X was able to detect and thwart an attack for Wood County Hospital, just days after launch.

RevealX Catches Ransomware Within Days of Deployment at Wood County Hospital

The landscape of ransomware attacks is rapidly evolving. Learn how ExtraHop Reveal X was able to detect and thwart an attack for Wood County Hospital, just days after launch.
ExtraHop
The Anatomy of a Ransomware Attack

The Anatomy of a Ransomware Attack

Unpacking a Ransomware Attack, Minute by Minute. If you could detect every inflection point of a ransomware attack as it unfolded in real time, what would you do differently?

The Anatomy of a Ransomware Attack

Unpacking a Ransomware Attack, Minute by Minute. If you could detect every inflection point of a ransomware attack as it unfolded in real time, what would you do differently?
ExtraHop
The ROI of RevealX Against Ransomware

The ROI of RevealX Against Ransomware

With ransomware incidents increasing by 50% in 2023, you need crucial detection that existing security tools miss. See how RevealX addresses gaps in traditional security measures, providing faster threat detection and resolution.

The ROI of RevealX Against Ransomware

With ransomware incidents increasing by 50% in 2023, you need crucial detection that existing security tools miss. See how RevealX addresses gaps in traditional security measures, providing faster threat detection and resolution.
ExtraHop
Defense in Depth: Not Deep Enough

Defense in Depth: Not Deep Enough

Available On-Demand

Defense in Depth: Not Deep Enough

Available On-Demand
Rubrik
The Dirt on ROT Data

The Dirt on ROT Data

Available On-Demand

The Dirt on ROT Data

Available On-Demand
Rubrik
Delivering Business Value Through a Well-Governed Digital Identity Program

Delivering Business Value Through a Well-Governed Digital Identity Program

Discover how Identity and Access Management (IAM) drives business value with an attribute-based approach. This white paper outlines a framework for identity governance, offering best practices and guidance to enhance security, simplify access, ensure compliance and deliver measurable results.

Delivering Business Value Through a Well-Governed Digital Identity Program

Discover how Identity and Access Management (IAM) drives business value with an attribute-based approach. This white paper outlines a framework for identity governance, offering best practices and guidance to enhance security, simplify access, ensure compliance and deliver measurable results.
GuidePoint Security
Navigating IAM In A Cloud Based World: Strategies and Technologies for Success

Navigating IAM In A Cloud Based World: Strategies and Technologies for Success

Navigate evolving cybersecurity threats with practical insights on cloud security and IAM synergies to protect your digital assets.

Navigating IAM In A Cloud Based World: Strategies and Technologies for Success

Navigate evolving cybersecurity threats with practical insights on cloud security and IAM synergies to protect your digital assets.
GuidePoint Security
Infographic: Emerging Best Practice for Proactive Security Solutions

Infographic: Emerging Best Practice for Proactive Security Solutions

Research shows that organizations are now investing in proactive security over preventative and reactive approaches, in the shift towards more pre-emptive attack surface exposure management.

Infographic: Emerging Best Practice for Proactive Security Solutions

Research shows that organizations are now investing in proactive security over preventative and reactive approaches, in the shift towards more pre-emptive attack surface exposure management.
Titania
Measuring Success: How to Build Cybersecurity Program Metrics from the Ground Up

Measuring Success: How to Build Cybersecurity Program Metrics from the Ground Up

In today's evolving cybersecurity landscape, effectively communicating metrics to both technical and non-technical audiences is crucial. As cyber threats become more sophisticated, cybersecurity has shifted from a "don’t let it interfere" mindset to a strategic priority, with CISOs under pressure to prove program effectiveness and optimize costs.

Measuring Success: How to Build Cybersecurity Program Metrics from the Ground Up

In today's evolving cybersecurity landscape, effectively communicating metrics to both technical and non-technical audiences is crucial. As cyber threats become more sophisticated, cybersecurity has shifted from a "don’t let it interfere" mindset to a strategic priority, with CISOs under pressure to prove program effectiveness and optimize costs.
Axonius
Research in Emerging Best Practice in the Use of Proactive Security Solutions

Research in Emerging Best Practice in the Use of Proactive Security Solutions

Research reveals over 70% of businesses have increased spending on proactive security, outpacing preventative and reactive measures.

Research in Emerging Best Practice in the Use of Proactive Security Solutions

Research reveals over 70% of businesses have increased spending on proactive security, outpacing preventative and reactive measures.
Titania
The State of Cyber Resilience: Why IT and security leaders are bolstering cyber resilience as complexity increases

The State of Cyber Resilience: Why IT and security leaders are bolstering cyber resilience as complexity increases

The IT and security industry is rapidly evolving due to digital transformation, changing work environments, and increasing cyber threats, creating more complexity for teams. To adapt, IT and security leaders are focusing on strengthening cyber resilience to protect against external threats and address internal challenges such as staffing and resource constraints.

The State of Cyber Resilience: Why IT and security leaders are bolstering cyber resilience as complexity increases

The IT and security industry is rapidly evolving due to digital transformation, changing work environments, and increasing cyber threats, creating more complexity for teams. To adapt, IT and security leaders are focusing on strengthening cyber resilience to protect against external threats and address internal challenges such as staffing and resource constraints.
Axonius
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.