Cybersecurity Resource Library

The #1 source for free Cybersecurity reports, whitepapers, webinars, research and more.

Showing results 601 - 630 of 921
Showing results 601 - 630 of 921

Filter by

Filters

Gartner� Quick Answer Report: What Are the Top and Niche Use Cases for Breach and Attack Simulation Technology?

Gartner� Quick Answer Report: What Are the Top and Niche Use Cases for Breach and Attack Simulation Technology?

According to Gartner®, breach and attack simulation (BAS) capabilities can help improve security posture and reduce exposure to attacks.

Gartner� Quick Answer Report: What Are the Top and Niche Use Cases for Breach and Attack Simulation Technology?

According to Gartner®, breach and attack simulation (BAS) capabilities can help improve security posture and reduce exposure to attacks.
Cymulate
Large Insurer goes beyond Breach and Attack Simulation (BAS) with Cymulate

Large Insurer goes beyond Breach and Attack Simulation (BAS) with Cymulate

With 38 branches and more than BRL 6.5 million in customers, one of the largest insurance companies in Brazil implemented a continuous security validation strategy, but their BAS tool was not comprehensive or easy to automate.

Large Insurer goes beyond Breach and Attack Simulation (BAS) with Cymulate

With 38 branches and more than BRL 6.5 million in customers, one of the largest insurance companies in Brazil implemented a continuous security validation strategy, but their BAS tool was not comprehensive or easy to automate.
Cymulate
The 10 Most Impactful Types of Vulnerabilities  for Enterprises Today

The 10 Most Impactful Types of Vulnerabilities for Enterprises Today

The enterprise attack surface is constantly expanding. Enterprises have to think beyond zero day vulnerabilities. It's imperative security teams start looking at vulnerabilities in 5G, firmware, edge, and ICS/OT, among others.

The 10 Most Impactful Types of Vulnerabilities for Enterprises Today

The enterprise attack surface is constantly expanding. Enterprises have to think beyond zero day vulnerabilities. It's imperative security teams start looking at vulnerabilities in 5G, firmware, edge, and ICS/OT, among others.
SonicWall
The 3 Approaches to Breach & Attack Simulation Technologies.

The 3 Approaches to Breach & Attack Simulation Technologies.

Testing the cybersecurity posture of an organization or its cybersecurity resilience to cyberattacks has come a long way. Demand for the latest and most comprehensive testing solutions continues to grow to counter the ever-increasing wave of cybercrime.

The 3 Approaches to Breach & Attack Simulation Technologies.

Testing the cybersecurity posture of an organization or its cybersecurity resilience to cyberattacks has come a long way. Demand for the latest and most comprehensive testing solutions continues to grow to counter the ever-increasing wave of cybercrime.
Cymulate
Understanding Vulnerability Prioritization Technologies - From Generic VM to VPT

Understanding Vulnerability Prioritization Technologies - From Generic VM to VPT

The precision of identifying the risk extent is in direct correlation with the scope of the data input the VPT can access and process, ranging from CVSS score to business risk evaluation and technological context.

Understanding Vulnerability Prioritization Technologies - From Generic VM to VPT

The precision of identifying the risk extent is in direct correlation with the scope of the data input the VPT can access and process, ranging from CVSS score to business risk evaluation and technological context.
Cymulate
How Applications Are Attacked: A Year in Application Security

How Applications Are Attacked: A Year in Application Security

| Available On-Demand |

How Applications Are Attacked: A Year in Application Security

| Available On-Demand |
Cloudflare
Guide to Open Source Software Security

Guide to Open Source Software Security

How to gain visibility to all your security risks

Guide to Open Source Software Security

How to gain visibility to all your security risks
Mend
The CISO's Guide to AppSec Innovation

The CISO's Guide to AppSec Innovation

Discover why AppSec needs to be integrated across the entirety of a development program.

The CISO's Guide to AppSec Innovation

Discover why AppSec needs to be integrated across the entirety of a development program.
Mend
The Importance of SBOMs in Protecting the Software Supply Chain

The Importance of SBOMs in Protecting the Software Supply Chain

Learn how to use SBOMs to better track and fix known and newly emerging vulnerabilities to keep your applications secure.

The Importance of SBOMs in Protecting the Software Supply Chain

Learn how to use SBOMs to better track and fix known and newly emerging vulnerabilities to keep your applications secure.
Mend
WTW uses Mend to reduce MTTR

WTW uses Mend to reduce MTTR

How WTW reduced their MTTR?

WTW uses Mend to reduce MTTR

How WTW reduced their MTTR?
Mend
Shoring Up the Software Supply Chain Across   Enterprise Applications

Shoring Up the Software Supply Chain Across Enterprise Applications

Supply chain security attacks are growing at an alarming pace, and things are going to keep getting worse until DevSecOps teams get on the same page. A little help from the feds could also be welcome

Shoring Up the Software Supply Chain Across Enterprise Applications

Supply chain security attacks are growing at an alarming pace, and things are going to keep getting worse until DevSecOps teams get on the same page. A little help from the feds could also be welcome
Fortify by OpenText
ChatGPT: Defending your business against AI-supercharged ransomware

ChatGPT: Defending your business against AI-supercharged ransomware

| Available On-Demand |

ChatGPT: Defending your business against AI-supercharged ransomware

| Available On-Demand |
Acronis
Managing Identity in the Cloud

Managing Identity in the Cloud

| Available On-Demand |

Managing Identity in the Cloud

| Available On-Demand |
Radiant Logic
The Importance of Bespoke Security

The Importance of Bespoke Security

| Available On-Demand |

The Importance of Bespoke Security

| Available On-Demand |
Darktrace
Shoring Up the Software Supply Chain Across Enterprise Applications

Shoring Up the Software Supply Chain Across Enterprise Applications

| Available On-Demand |

Shoring Up the Software Supply Chain Across Enterprise Applications

| Available On-Demand |
OpenText
The Craziest Cyberattacks Seen In the Wild and How You Can Avoid Them

The Craziest Cyberattacks Seen In the Wild and How You Can Avoid Them

| Available On-Demand |

The Craziest Cyberattacks Seen In the Wild and How You Can Avoid Them

| Available On-Demand |
KnowBe4
The Ransomware Evolution: Protecting Against Professionalized Cybercriminal Operations

The Ransomware Evolution: Protecting Against Professionalized Cybercriminal Operations

| Available On-Demand |

The Ransomware Evolution: Protecting Against Professionalized Cybercriminal Operations

| Available On-Demand |
Fortinet
Deciphering the Hype Around XDR

Deciphering the Hype Around XDR

| Available On-Demand |

Deciphering the Hype Around XDR

| Available On-Demand |
Palo Alto Networks
Zero Trust Security 101: What You Need to Know Before Getting Started

Zero Trust Security 101: What You Need to Know Before Getting Started

| Available On-Demand |

Zero Trust Security 101: What You Need to Know Before Getting Started

| Available On-Demand |
Venafi
Rethinking Authentication: MFA, Passwordless, Certificates, and More

Rethinking Authentication: MFA, Passwordless, Certificates, and More

| Available On-Demand |

Rethinking Authentication: MFA, Passwordless, Certificates, and More

| Available On-Demand |
Delinea
Every DDoS Resilience and Response Playbook Should Include These Things

Every DDoS Resilience and Response Playbook Should Include These Things

| Available On-Demand |

Every DDoS Resilience and Response Playbook Should Include These Things

| Available On-Demand |
NETSCOUT
The Promise and Reality of Cloud Security

The Promise and Reality of Cloud Security

Cloud security has been part of the cybersecurity conversation for years but has been on the sidelines for most enterprises.

The Promise and Reality of Cloud Security

Cloud security has been part of the cybersecurity conversation for years but has been on the sidelines for most enterprises.
Dark Reading
A Roadmap to Zero Trust: Steps for Meaningful Progress Amongst the Hype

A Roadmap to Zero Trust: Steps for Meaningful Progress Amongst the Hype

| Available On-Demand |

A Roadmap to Zero Trust: Steps for Meaningful Progress Amongst the Hype

| Available On-Demand |
Cloudflare
Network Segmentation and Microsegmentation: Keys to the Next Generation of Enterprise Defense

Network Segmentation and Microsegmentation: Keys to the Next Generation of Enterprise Defense

| Available On-Demand |

Network Segmentation and Microsegmentation: Keys to the Next Generation of Enterprise Defense

| Available On-Demand |
Optiv & Palo Alto Networks
10 Hot Talks From Black Hat USA 2022

10 Hot Talks From Black Hat USA 2022

Black Hat USA brings together cutting-edge research, new security tools, and sophisticated defensive techniques over the course of two days.

10 Hot Talks From Black Hat USA 2022

Black Hat USA brings together cutting-edge research, new security tools, and sophisticated defensive techniques over the course of two days.
Dark Reading
10 Ways a Zero Trust Architecture Protects Against Ransomware

10 Ways a Zero Trust Architecture Protects Against Ransomware

Ransomware is the biggest threat to digital business

10 Ways a Zero Trust Architecture Protects Against Ransomware

Ransomware is the biggest threat to digital business
Zscaler
2022 Zscaler ThreatLabs State of Ransomware Report

2022 Zscaler ThreatLabs State of Ransomware Report

Ransomware is more and more attractive to attackers, who are able to wage increasingly profitable campaigns based on three major trends

2022 Zscaler ThreatLabs State of Ransomware Report

Ransomware is more and more attractive to attackers, who are able to wage increasingly profitable campaigns based on three major trends
Zscaler
6 Elements of a Solid IoT Security Strategy

6 Elements of a Solid IoT Security Strategy

Every new Internet of Things device added to the enterprise network introduces a fleet of potential issues.

6 Elements of a Solid IoT Security Strategy

Every new Internet of Things device added to the enterprise network introduces a fleet of potential issues.
Microsoft
Analyzing the Economic Benefits of Microsoft Defender for IoT

Analyzing the Economic Benefits of Microsoft Defender for IoT

Operational technology (OT) networks are the backbone of industrial and critical infrastructure organizations around the world

Analyzing the Economic Benefits of Microsoft Defender for IoT

Operational technology (OT) networks are the backbone of industrial and critical infrastructure organizations around the world
Microsoft
Building Operational Resilience in Industrial & Critical Infrastructure

Building Operational Resilience in Industrial & Critical Infrastructure

Continuous asset management and threat monitoring for your OT devices

Building Operational Resilience in Industrial & Critical Infrastructure

Continuous asset management and threat monitoring for your OT devices
Microsoft
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.