Sponsored By

Cybersecurity Resource Library

The #1 source for free Cybersecurity reports, whitepapers, webinars, research and more.

Showing results 31 - 60 of 813
Showing results 31 - 60 of 813

Filter by

Filters

EMA: AI at your fingertips: How Elastic AI Assistant simplifies cybersecurity

EMA: AI at your fingertips: How Elastic AI Assistant simplifies cybersecurity

AI assistants for cybersecurity use cases are a force-multiplier for organizations seeking to navigate complex cybersecurity landscapes and optimize analyst workloads.

EMA: AI at your fingertips: How Elastic AI Assistant simplifies cybersecurity

AI assistants for cybersecurity use cases are a force-multiplier for organizations seeking to navigate complex cybersecurity landscapes and optimize analyst workloads.
Elastic
How Supply Chain Attacks Work -- And How to Stop Them

How Supply Chain Attacks Work -- And How to Stop Them

| Live Webinar | Thursday, March 7, 2024 | 1pm ET |

How Supply Chain Attacks Work -- And How to Stop Them

| Live Webinar | Thursday, March 7, 2024 | 1pm ET |
JFrog
2023 Global Cyber Confidence Index

2023 Global Cyber Confidence Index

Learn how cybersecurity debt drives up costs and ransomware risk.

2023 Global Cyber Confidence Index

Learn how cybersecurity debt drives up costs and ransomware risk.
ExtraHop
The Crisis of Convergence: OT/ICS Cybersecurity in 2023

The Crisis of Convergence: OT/ICS Cybersecurity in 2023

Events in the threat landscape have escalated significantly within the industrial manufacturing and critical infrastructure sectors, leading to destruction, economic loss, and endangerment of human safety.

The Crisis of Convergence: OT/ICS Cybersecurity in 2023

Events in the threat landscape have escalated significantly within the industrial manufacturing and critical infrastructure sectors, leading to destruction, economic loss, and endangerment of human safety.
TXOne Networks
The Generative AI Tipping Point

The Generative AI Tipping Point

Learn, from over 1,200 security and IT leaders, how organizations around the world are handling the latest developments in generative AI.

The Generative AI Tipping Point

Learn, from over 1,200 security and IT leaders, how organizations around the world are handling the latest developments in generative AI.
ExtraHop
The True Cost of a Security Breach

The True Cost of a Security Breach

Examine the cost analysis of high profile data breaches that destroyed earnings.

The True Cost of a Security Breach

Examine the cost analysis of high profile data breaches that destroyed earnings.
ExtraHop
The Evolution of AI, ML and Gen AI in Identity Products and Solutions

The Evolution of AI, ML and Gen AI in Identity Products and Solutions

In this webinar Omdia will discuss the evolution of identity in AI, ML and Gen AI.

The Evolution of AI, ML and Gen AI in Identity Products and Solutions

In this webinar Omdia will discuss the evolution of identity in AI, ML and Gen AI.
Okta
Unbiased Testing. Unbeatable Results

Unbiased Testing. Unbeatable Results

| Live Webinar | Thursday, February 22, 2024 | 1pm ET |

Unbiased Testing. Unbeatable Results

| Live Webinar | Thursday, February 22, 2024 | 1pm ET |
Palo Alto Networks
How To Prevent Advanced Zero Day Attacks with AccuKnox Zero Trust CNAPP

How To Prevent Advanced Zero Day Attacks with AccuKnox Zero Trust CNAPP

If organizations don’t adapt to the new development and adopt the Zero Trust principles, they probably will be going out of business in this digital world. - PWC. Understand the practical steps to transform your organization’s cloud security strategy with AccuKnox Zero Trust CNAPP

How To Prevent Advanced Zero Day Attacks with AccuKnox Zero Trust CNAPP

If organizations don’t adapt to the new development and adopt the Zero Trust principles, they probably will be going out of business in this digital world. - PWC. Understand the practical steps to transform your organization’s cloud security strategy with AccuKnox Zero Trust CNAPP
AccuKnox
How To Prevent Threats Before They Happen with 'Inline Runtime Protection'

How To Prevent Threats Before They Happen with 'Inline Runtime Protection'

Post-attack mitigation is often flawed. Post-attack mitigation is too little, too late! How to leave breached containers and stolen data behind by switching to AccuKnox “Inline Runtime Security”. Stop threats before damage locking down Kubernetes and cloud threats while letting your applications thrive

How To Prevent Threats Before They Happen with 'Inline Runtime Protection'

Post-attack mitigation is often flawed. Post-attack mitigation is too little, too late! How to leave breached containers and stolen data behind by switching to AccuKnox “Inline Runtime Security”. Stop threats before damage locking down Kubernetes and cloud threats while letting your applications thrive
AccuKnox
CMMC Compliance and Managed Services

CMMC Compliance and Managed Services

Empower Your Defense Supply Chain with CMMC Compliance: Elevate Cybersecurity Maturity, Gain Trust, and Secure Future Contracts.

CMMC Compliance and Managed Services

Empower Your Defense Supply Chain with CMMC Compliance: Elevate Cybersecurity Maturity, Gain Trust, and Secure Future Contracts.
Abacode Cybersecurity & Compliance
Digital Trust is Broken

Digital Trust is Broken

But We Can Fix It!

Digital Trust is Broken

But We Can Fix It!
Abacode Cybersecurity & Compliance
Endpoint Detection & Response (EDR)

Endpoint Detection & Response (EDR)

Securing Tomorrow: A Deep Dive into Evolving Endpoint Protection Solutions and the Pinnacle Players in Cybersecurity

Endpoint Detection & Response (EDR)

Securing Tomorrow: A Deep Dive into Evolving Endpoint Protection Solutions and the Pinnacle Players in Cybersecurity
Abacode Cybersecurity & Compliance
K-12 Report

K-12 Report

CIS® MS-ISAC® Cybersecurity Assessment of the 2022-2023 School Year

K-12 Report

CIS® MS-ISAC® Cybersecurity Assessment of the 2022-2023 School Year
Center for Internet Security
Public Sector Cyber Defense Guide

Public Sector Cyber Defense Guide

5 Ways to Improve Your Organization’s Cyber Defense Program

Public Sector Cyber Defense Guide

5 Ways to Improve Your Organization’s Cyber Defense Program
Center for Internet Security
There is a Better Way!

There is a Better Way!

Why the Current Approach to Cybersecurity & Compliance Does Not Work

There is a Better Way!

Why the Current Approach to Cybersecurity & Compliance Does Not Work
Abacode Cybersecurity & Compliance
Your Everywhere Security guide: Four steps to stop cyberattacks

Your Everywhere Security guide: Four steps to stop cyberattacks

| Live Webinar | Tuesday, February 27, 2024 | 1pm ET |

Your Everywhere Security guide: Four steps to stop cyberattacks

| Live Webinar | Tuesday, February 27, 2024 | 1pm ET |
Cloudflare
Making Sense of Security Operations Data

Making Sense of Security Operations Data

| Live Webinar | Wednesday, February 21, 2024 | 1pm ET |

Making Sense of Security Operations Data

| Live Webinar | Wednesday, February 21, 2024 | 1pm ET |
Mandiant
Securing the Software Development Life Cycle from Start to Finish

Securing the Software Development Life Cycle from Start to Finish

| Live Webinar | Wednesday, March 6, 2024 | 1pm ET |

Securing the Software Development Life Cycle from Start to Finish

| Live Webinar | Wednesday, March 6, 2024 | 1pm ET |
Palo Alto Networks
Buyer's Guide for Generative AI Code Security

Buyer's Guide for Generative AI Code Security

Check out Snyk’s latest buyer’s guide and find out how you can equip your team against potential vulnerabilities with over reliance on generative AI.

Buyer's Guide for Generative AI Code Security

Check out Snyk’s latest buyer’s guide and find out how you can equip your team against potential vulnerabilities with over reliance on generative AI.
Snyk
Beyond EDR: How to Make Sense of XDR

Beyond EDR: How to Make Sense of XDR

Beyond EDR: How to Make Sense of XDR

Beyond EDR: How to Make Sense of XDR

Beyond EDR: How to Make Sense of XDR
VMware
EDR Made Better. XDR Made Easy

EDR Made Better. XDR Made Easy

EDR Made Better. XDR Made Easy

EDR Made Better. XDR Made Easy

EDR Made Better. XDR Made Easy
VMware
Redefining the Security Analyst Experience: EDR to XDR

Redefining the Security Analyst Experience: EDR to XDR

Redefining the Security Analyst Experience: EDR to XDR

Redefining the Security Analyst Experience: EDR to XDR

Redefining the Security Analyst Experience: EDR to XDR
VMware
VMware Carbon Black XDR

VMware Carbon Black XDR

VMware Carbon Black XDR

VMware Carbon Black XDR

VMware Carbon Black XDR
VMware
API Security: Protecting Your Application's Attack Surface

API Security: Protecting Your Application's Attack Surface

| Live Webinar | Thursday, February 29, 2024 | 1pm ET |

API Security: Protecting Your Application's Attack Surface

| Live Webinar | Thursday, February 29, 2024 | 1pm ET |
Apiiro
App Control For Dummies

App Control For Dummies

App Control for Dummies

App Control For Dummies

App Control for Dummies
VMware
Carbon Black Named XDR Leader by Frost & Sullivan

Carbon Black Named XDR Leader by Frost & Sullivan

Frost & Sullivan Report - XDR

Carbon Black Named XDR Leader by Frost & Sullivan

Frost & Sullivan Report - XDR
VMware
Six Benefits of App Control

Six Benefits of App Control

Six Benefits of App Control

Six Benefits of App Control

Six Benefits of App Control
VMware
Six Benefits of App Control Finserv

Six Benefits of App Control Finserv

Six Benefits of App Control Finserv

Six Benefits of App Control Finserv

Six Benefits of App Control Finserv
VMware
Holistic Security for AZURE, AWS and GCP

Holistic Security for AZURE, AWS and GCP

Read the white paper to learn how CNAPP solutions can help secure and reduce your attack surface.

Holistic Security for AZURE, AWS and GCP

Read the white paper to learn how CNAPP solutions can help secure and reduce your attack surface.
Tenable
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.