Cybersecurity Resource Library

The #1 source for free Cybersecurity reports, whitepapers, webinars, research and more.

Showing results 541 - 570 of 854
Showing results 541 - 570 of 854

Filter by

Filters

The CISO's Guide to AppSec Innovation

The CISO's Guide to AppSec Innovation

Discover why AppSec needs to be integrated across the entirety of a development program.

The CISO's Guide to AppSec Innovation

Discover why AppSec needs to be integrated across the entirety of a development program.
Mend
The Importance of SBOMs in Protecting the Software Supply Chain

The Importance of SBOMs in Protecting the Software Supply Chain

Learn how to use SBOMs to better track and fix known and newly emerging vulnerabilities to keep your applications secure.

The Importance of SBOMs in Protecting the Software Supply Chain

Learn how to use SBOMs to better track and fix known and newly emerging vulnerabilities to keep your applications secure.
Mend
WTW uses Mend to reduce MTTR

WTW uses Mend to reduce MTTR

How WTW reduced their MTTR?

WTW uses Mend to reduce MTTR

How WTW reduced their MTTR?
Mend
Shoring Up the Software Supply Chain Across   Enterprise Applications

Shoring Up the Software Supply Chain Across Enterprise Applications

Supply chain security attacks are growing at an alarming pace, and things are going to keep getting worse until DevSecOps teams get on the same page. A little help from the feds could also be welcome

Shoring Up the Software Supply Chain Across Enterprise Applications

Supply chain security attacks are growing at an alarming pace, and things are going to keep getting worse until DevSecOps teams get on the same page. A little help from the feds could also be welcome
Fortify by OpenText
ChatGPT: Defending your business against AI-supercharged ransomware

ChatGPT: Defending your business against AI-supercharged ransomware

| Available On-Demand |

ChatGPT: Defending your business against AI-supercharged ransomware

| Available On-Demand |
Acronis
Managing Identity in the Cloud

Managing Identity in the Cloud

| Available On-Demand |

Managing Identity in the Cloud

| Available On-Demand |
Radiant Logic
The Importance of Bespoke Security

The Importance of Bespoke Security

| Available On-Demand |

The Importance of Bespoke Security

| Available On-Demand |
Darktrace
Shoring Up the Software Supply Chain Across Enterprise Applications

Shoring Up the Software Supply Chain Across Enterprise Applications

| Available On-Demand |

Shoring Up the Software Supply Chain Across Enterprise Applications

| Available On-Demand |
OpenText
The Craziest Cyberattacks Seen In the Wild and How You Can Avoid Them

The Craziest Cyberattacks Seen In the Wild and How You Can Avoid Them

| Available On-Demand |

The Craziest Cyberattacks Seen In the Wild and How You Can Avoid Them

| Available On-Demand |
KnowBe4
The Ransomware Evolution: Protecting Against Professionalized Cybercriminal Operations

The Ransomware Evolution: Protecting Against Professionalized Cybercriminal Operations

| Available On-Demand |

The Ransomware Evolution: Protecting Against Professionalized Cybercriminal Operations

| Available On-Demand |
Fortinet
Deciphering the Hype Around XDR

Deciphering the Hype Around XDR

| Available On-Demand |

Deciphering the Hype Around XDR

| Available On-Demand |
Palo Alto Networks
Zero Trust Security 101: What You Need to Know Before Getting Started

Zero Trust Security 101: What You Need to Know Before Getting Started

| Available On-Demand |

Zero Trust Security 101: What You Need to Know Before Getting Started

| Available On-Demand |
Venafi
Rethinking Authentication: MFA, Passwordless, Certificates, and More

Rethinking Authentication: MFA, Passwordless, Certificates, and More

| Available On-Demand |

Rethinking Authentication: MFA, Passwordless, Certificates, and More

| Available On-Demand |
Delinea
Every DDoS Resilience and Response Playbook Should Include These Things

Every DDoS Resilience and Response Playbook Should Include These Things

| Available On-Demand |

Every DDoS Resilience and Response Playbook Should Include These Things

| Available On-Demand |
NETSCOUT
The Promise and Reality of Cloud Security

The Promise and Reality of Cloud Security

Cloud security has been part of the cybersecurity conversation for years but has been on the sidelines for most enterprises.

The Promise and Reality of Cloud Security

Cloud security has been part of the cybersecurity conversation for years but has been on the sidelines for most enterprises.
Dark Reading
A Roadmap to Zero Trust: Steps for Meaningful Progress Amongst the Hype

A Roadmap to Zero Trust: Steps for Meaningful Progress Amongst the Hype

| Available On-Demand |

A Roadmap to Zero Trust: Steps for Meaningful Progress Amongst the Hype

| Available On-Demand |
Cloudflare
Network Segmentation and Microsegmentation: Keys to the Next Generation of Enterprise Defense

Network Segmentation and Microsegmentation: Keys to the Next Generation of Enterprise Defense

| Available On-Demand |

Network Segmentation and Microsegmentation: Keys to the Next Generation of Enterprise Defense

| Available On-Demand |
Optiv & Palo Alto Networks
10 Hot Talks From Black Hat USA 2022

10 Hot Talks From Black Hat USA 2022

Black Hat USA brings together cutting-edge research, new security tools, and sophisticated defensive techniques over the course of two days.

10 Hot Talks From Black Hat USA 2022

Black Hat USA brings together cutting-edge research, new security tools, and sophisticated defensive techniques over the course of two days.
Dark Reading
10 Ways a Zero Trust Architecture Protects Against Ransomware

10 Ways a Zero Trust Architecture Protects Against Ransomware

Ransomware is the biggest threat to digital business

10 Ways a Zero Trust Architecture Protects Against Ransomware

Ransomware is the biggest threat to digital business
Zscaler
2022 Zscaler ThreatLabs State of Ransomware Report

2022 Zscaler ThreatLabs State of Ransomware Report

Ransomware is more and more attractive to attackers, who are able to wage increasingly profitable campaigns based on three major trends

2022 Zscaler ThreatLabs State of Ransomware Report

Ransomware is more and more attractive to attackers, who are able to wage increasingly profitable campaigns based on three major trends
Zscaler
6 Elements of a Solid IoT Security Strategy

6 Elements of a Solid IoT Security Strategy

Every new Internet of Things device added to the enterprise network introduces a fleet of potential issues.

6 Elements of a Solid IoT Security Strategy

Every new Internet of Things device added to the enterprise network introduces a fleet of potential issues.
Microsoft
Analyzing the Economic Benefits of Microsoft Defender for IoT

Analyzing the Economic Benefits of Microsoft Defender for IoT

Operational technology (OT) networks are the backbone of industrial and critical infrastructure organizations around the world

Analyzing the Economic Benefits of Microsoft Defender for IoT

Operational technology (OT) networks are the backbone of industrial and critical infrastructure organizations around the world
Microsoft
Building Operational Resilience in Industrial & Critical Infrastructure

Building Operational Resilience in Industrial & Critical Infrastructure

Continuous asset management and threat monitoring for your OT devices

Building Operational Resilience in Industrial & Critical Infrastructure

Continuous asset management and threat monitoring for your OT devices
Microsoft
Creating an Effective Incident Response Plan

Creating an Effective Incident Response Plan

The Rise in Material Breaches

Creating an Effective Incident Response Plan

The Rise in Material Breaches
Mandiant
How Enterprises Are Attacking the Cybersecurity Problem Report

How Enterprises Are Attacking the Cybersecurity Problem Report

Cloud, supply chain, and endpoint security emerge as major focus areas

How Enterprises Are Attacking the Cybersecurity Problem Report

Cloud, supply chain, and endpoint security emerge as major focus areas
Zscaler
IoT and OT: Evolving Cyberthreats and Strategies for Risk Mitigation

IoT and OT: Evolving Cyberthreats and Strategies for Risk Mitigation

Innovation-driven opportunity in an exponentially larger attack landscape

IoT and OT: Evolving Cyberthreats and Strategies for Risk Mitigation

Innovation-driven opportunity in an exponentially larger attack landscape
Microsoft
IT and OT Convergence Is Happening, but Is Security Ready?

IT and OT Convergence Is Happening, but Is Security Ready?

What is a CISO to do?

IT and OT Convergence Is Happening, but Is Security Ready?

What is a CISO to do?
Microsoft
Microsoft 365 and Integrated Cloud Email Security: Transitioning from a SEG to ICES

Microsoft 365 and Integrated Cloud Email Security: Transitioning from a SEG to ICES

Transitioning from a Secure Email Gateway to Modern Architecture for the Modern Enterprise

Microsoft 365 and Integrated Cloud Email Security: Transitioning from a SEG to ICES

Transitioning from a Secure Email Gateway to Modern Architecture for the Modern Enterprise
SlashNext
Ransomware in Focus: New Research on CISO Perceptions, Perspectives, and Plans

Ransomware in Focus: New Research on CISO Perceptions, Perspectives, and Plans

As the ransomware problem continues to worsen and the ability to obtain and/or maintain insurance coverage becomes increasingly problematic, shoring up technical defenses is a necessity.

Ransomware in Focus: New Research on CISO Perceptions, Perspectives, and Plans

As the ransomware problem continues to worsen and the ability to obtain and/or maintain insurance coverage becomes increasingly problematic, shoring up technical defenses is a necessity.
Zscaler
Software Supply Chain Security Best Practices Guide

Software Supply Chain Security Best Practices Guide

Read Now

Software Supply Chain Security Best Practices Guide

Read Now
Legit Security
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.