Cybersecurity Resource Library

The #1 source for free Cybersecurity reports, whitepapers, webinars, research and more.

Showing results 571 - 600 of 921
Showing results 571 - 600 of 921

Filter by

Filters

How Snowflake Keeps Critical IP Safe Without Disrupting Productivity

How Snowflake Keeps Critical IP Safe Without Disrupting Productivity

Challenge: Full visibility without roadblocks

How Snowflake Keeps Critical IP Safe Without Disrupting Productivity

Challenge: Full visibility without roadblocks
Code42 Software
How to Prevent Burnout: Protect Your Employees and Your Data

How to Prevent Burnout: Protect Your Employees and Your Data

How security leaders can build user-centric security programs that reduce employee stress & enhance adherence

How to Prevent Burnout: Protect Your Employees and Your Data

How security leaders can build user-centric security programs that reduce employee stress & enhance adherence
Code42 Software
Okta Chooses IRM Over CASB to Avoid Data Leak from Cloud File Sharing

Okta Chooses IRM Over CASB to Avoid Data Leak from Cloud File Sharing

Learn how Okta's security team addressed increasing data risk by prioritizing a data protection initiative that would bolster their control over cloud data.

Okta Chooses IRM Over CASB to Avoid Data Leak from Cloud File Sharing

Learn how Okta's security team addressed increasing data risk by prioritizing a data protection initiative that would bolster their control over cloud data.
Code42 Software
Puzzled by Patching: Solve Endpoint Pains

Puzzled by Patching: Solve Endpoint Pains

| Available On-Demand |

Puzzled by Patching: Solve Endpoint Pains

| Available On-Demand |
Automox
Ten Emerging Vulnerabilities Every Enterprise Should Know

Ten Emerging Vulnerabilities Every Enterprise Should Know

| Available On-Demand |

Ten Emerging Vulnerabilities Every Enterprise Should Know

| Available On-Demand |
SonicWall
Successfully Managing Identity in Modern Cloud and Hybrid Environments

Successfully Managing Identity in Modern Cloud and Hybrid Environments

Cloud promised to simplify the security and management of enterprise systems. In many ways it has, but when it comes to identity management it’s as complicated as ever. This report details how to get identity programs on track -- and keep them that way.

Successfully Managing Identity in Modern Cloud and Hybrid Environments

Cloud promised to simplify the security and management of enterprise systems. In many ways it has, but when it comes to identity management it’s as complicated as ever. This report details how to get identity programs on track -- and keep them that way.
Radiant Logic
Building Out the Best Response Playbook for Ransomware Attacks

Building Out the Best Response Playbook for Ransomware Attacks

| Available On-Demand |

Building Out the Best Response Playbook for Ransomware Attacks

| Available On-Demand |
Palo Alto Networks
How to Accelerate XDR Outcomes: Bridging the Gap Between Network and Endpoint

How to Accelerate XDR Outcomes: Bridging the Gap Between Network and Endpoint

| Available On-Demand |

How to Accelerate XDR Outcomes: Bridging the Gap Between Network and Endpoint

| Available On-Demand |
ExtraHop
Microsoft 365  and Integrated Cloud Email Security: Transitioning from a SEG to ICES

Microsoft 365 and Integrated Cloud Email Security: Transitioning from a SEG to ICES

Learn how to transitioning from a secure email gateway to integrated cloud email security to meet the demands of the new threat landscape.

Microsoft 365 and Integrated Cloud Email Security: Transitioning from a SEG to ICES

Learn how to transitioning from a secure email gateway to integrated cloud email security to meet the demands of the new threat landscape.
SlashNext
State of Phishing 2022

State of Phishing 2022

Download this report to learn about the latest threat trends and what’s required to avoid breaches in 2022.

State of Phishing 2022

Download this report to learn about the latest threat trends and what’s required to avoid breaches in 2022.
SlashNext
The Human Hacking Report

The Human Hacking Report

Download this report to learn how phishing is a human problem that needs to be addressed across all digital channels.

The Human Hacking Report

Download this report to learn how phishing is a human problem that needs to be addressed across all digital channels.
SlashNext
The Mobile BYOD Intelligence Report

The Mobile BYOD Intelligence Report

New research on Bring Your Own Device (BYOD) trends for today's workforce and the security risks for organizations.

The Mobile BYOD Intelligence Report

New research on Bring Your Own Device (BYOD) trends for today's workforce and the security risks for organizations.
SlashNext
The Threat Landscape is Evolving to Multi-Channel Attacks

The Threat Landscape is Evolving to Multi-Channel Attacks

Learn how multi-channel work new threat landscape.

The Threat Landscape is Evolving to Multi-Channel Attacks

Learn how multi-channel work new threat landscape.
SlashNext
How Supply Chain Attacks Work -- And What You Can Do to Stop Them

How Supply Chain Attacks Work -- And What You Can Do to Stop Them

| Available On-Demand |

How Supply Chain Attacks Work -- And What You Can Do to Stop Them

| Available On-Demand |
Mend
DevSecOps: The Smart Way to Shift Left

DevSecOps: The Smart Way to Shift Left

| Available On-Demand |

DevSecOps: The Smart Way to Shift Left

| Available On-Demand |
Wiz
A Security Leader's Guide to Leveraging MDR for Security Maturity and Development

A Security Leader's Guide to Leveraging MDR for Security Maturity and Development

Get a common framework for the security maturity hierarchy and program strategies for each level of maturity with this report & guide.

A Security Leader's Guide to Leveraging MDR for Security Maturity and Development

Get a common framework for the security maturity hierarchy and program strategies for each level of maturity with this report & guide.
Arctic Wolf
AppSec Best Practices: Where Speed, Security, and Innovation Meet in the Middle

AppSec Best Practices: Where Speed, Security, and Innovation Meet in the Middle

Learn what tools, processes, and strategy will optimize both speed of web app development and application security.

AppSec Best Practices: Where Speed, Security, and Innovation Meet in the Middle

Learn what tools, processes, and strategy will optimize both speed of web app development and application security.
Invicti
Endpoint Protection Best Practices to Block Ransomware

Endpoint Protection Best Practices to Block Ransomware

Get practical guidance on configuring your endpoint solution to provide optimum protection.

Endpoint Protection Best Practices to Block Ransomware

Get practical guidance on configuring your endpoint solution to provide optimum protection.
Sophos Inc.
ESG Report: Automated Application Security Testing for Faster Development

ESG Report: Automated Application Security Testing for Faster Development

Learn how to overcome top application security challenges, which tools to implement, and AppSec strategies that work.

ESG Report: Automated Application Security Testing for Faster Development

Learn how to overcome top application security challenges, which tools to implement, and AppSec strategies that work.
Invicti
Every Minute Matters: Real-World Incident Response Timelines In Action

Every Minute Matters: Real-World Incident Response Timelines In Action

Could your organization detect a ransomware attack in under 5 minutes? Download this guide to explore real-world examples and learn more about how Arctic Wolf’s Concierge Security experts have helped organizations protect their assets, avoid breaches, and continually improve their security posture over time.

Every Minute Matters: Real-World Incident Response Timelines In Action

Could your organization detect a ransomware attack in under 5 minutes? Download this guide to explore real-world examples and learn more about how Arctic Wolf’s Concierge Security experts have helped organizations protect their assets, avoid breaches, and continually improve their security posture over time.
Arctic Wolf
Getting Started with Threat Hunting

Getting Started with Threat Hunting

The practice of threat hunting has become critical in stopping today's elusive human-led cyber threats -- but it isn't easy.

Getting Started with Threat Hunting

The practice of threat hunting has become critical in stopping today's elusive human-led cyber threats -- but it isn't easy.
Sophos Inc.
Invicti AppSec Indicator: Tuning Out the AppSec Noise is All About DAST

Invicti AppSec Indicator: Tuning Out the AppSec Noise is All About DAST

Learn what DevSecOps professionals prioritize in 2023, as well as how to maximize your AppSec ROI.

Invicti AppSec Indicator: Tuning Out the AppSec Noise is All About DAST

Learn what DevSecOps professionals prioritize in 2023, as well as how to maximize your AppSec ROI.
Invicti
Proof-Based Scanning: No noise, just facts

Proof-Based Scanning: No noise, just facts

Learn how you can streamline web vulnerability scanning and save valuable resources whilst quickly delivering on your ROI.

Proof-Based Scanning: No noise, just facts

Learn how you can streamline web vulnerability scanning and save valuable resources whilst quickly delivering on your ROI.
Invicti
The Big Business Of Cybercrime: A Deep Dive Guide

The Big Business Of Cybercrime: A Deep Dive Guide

Cybercrime has become a big business -- an entire ecosystem of organizations run just like yours. This report seeks to enlighten your understanding of cybercrime, including the vast ramifications it entails for your business now and in the future.

The Big Business Of Cybercrime: A Deep Dive Guide

Cybercrime has become a big business -- an entire ecosystem of organizations run just like yours. This report seeks to enlighten your understanding of cybercrime, including the vast ramifications it entails for your business now and in the future.
Arctic Wolf
The Critical Role of Frontline Cyber Defenses in Cyber Insurance Adoption

The Critical Role of Frontline Cyber Defenses in Cyber Insurance Adoption

Find out how strong cybersecurity controls can help reduce cyber insurance premiums and lower risk.

The Critical Role of Frontline Cyber Defenses in Cyber Insurance Adoption

Find out how strong cybersecurity controls can help reduce cyber insurance premiums and lower risk.
Sophos Inc.
The State of Cybersecurity: 2023 Trends Report

The State of Cybersecurity: 2023 Trends Report

Over 700 IT leaders were surveyed in December 2022 to better understand cybersecurity trends for 2023. Read how organizations around the globe are establishing priorities and addressing top security challenges in the State of Cybersecurity: 2023 Trends Report.

The State of Cybersecurity: 2023 Trends Report

Over 700 IT leaders were surveyed in December 2022 to better understand cybersecurity trends for 2023. Read how organizations around the globe are establishing priorities and addressing top security challenges in the State of Cybersecurity: 2023 Trends Report.
Arctic Wolf
Welcome to Modern Web App Security

Welcome to Modern Web App Security

Learn how to stay ahead of malicious attackers by implementing a robust AppSec approach that works.

Welcome to Modern Web App Security

Learn how to stay ahead of malicious attackers by implementing a robust AppSec approach that works.
Invicti
How Firewalls Fit With Modern Enterprise Security

How Firewalls Fit With Modern Enterprise Security

| Available On-Demand |

How Firewalls Fit With Modern Enterprise Security

| Available On-Demand |
Fortinet
SBOMS and the Modern Enterprise Software Supply Chain

SBOMS and the Modern Enterprise Software Supply Chain

| Available On-Demand |

SBOMS and the Modern Enterprise Software Supply Chain

| Available On-Demand |
Synopsys
Cymulate Named Innovation Leader, Frost & Sullivan's - Frost Radar™️ BAS, 2022

Cymulate Named Innovation Leader, Frost & Sullivan's - Frost Radar™️ BAS, 2022

The Frost Radar™ for BAS is a benchmarking report that recognizes Cymulate’s ability to empower all stakeholders of the organization to make risk-informed business decisions without overwhelming the security teams or the CISO.

Cymulate Named Innovation Leader, Frost & Sullivan's - Frost Radar™️ BAS, 2022

The Frost Radar™ for BAS is a benchmarking report that recognizes Cymulate’s ability to empower all stakeholders of the organization to make risk-informed business decisions without overwhelming the security teams or the CISO.
Cymulate
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.