Cybersecurity Resource Library

The #1 source for free Cybersecurity reports, whitepapers, webinars, research and more.

Showing results 781 - 810 of 959
Showing results 781 - 810 of 959

Filter by

Filters

2021 Cyberthreat Defense Report

2021 Cyberthreat Defense Report

In 2020, 86 percent of organizations experienced a successful attack, up from 81 percent the prior year, resulting in the largest year-over-year increase in the last six years.

2021 Cyberthreat Defense Report

In 2020, 86 percent of organizations experienced a successful attack, up from 81 percent the prior year, resulting in the largest year-over-year increase in the last six years.
Menlo Security
2021 State of Cybersecurity Effectiveness Usage Report

2021 State of Cybersecurity Effectiveness Usage Report

Insights From Security Controls and Posture Assessment Data

2021 State of Cybersecurity Effectiveness Usage Report

Insights From Security Controls and Posture Assessment Data
Cymulate
2022 Cortex Xpanse Attack Surface Threat Report

2022 Cortex Xpanse Attack Surface Threat Report

The Cortex Xpanse research team monitored scans of 50 million IP addresses associated with 100+ global enterprises to uncover the most prevalent attack surface threats in various industries

2022 Cortex Xpanse Attack Surface Threat Report

The Cortex Xpanse research team monitored scans of 50 million IP addresses associated with 100+ global enterprises to uncover the most prevalent attack surface threats in various industries
Palo Alto Networks
2022 Cyber Predictions

2022 Cyber Predictions

Here are 11 predictions from Cymulate’s cyber-security experts.

2022 Cyber Predictions

Here are 11 predictions from Cymulate’s cyber-security experts.
Cymulate
2022 Cyberthreat Defense Report - Sponsored by (ISC)�

2022 Cyberthreat Defense Report - Sponsored by (ISC)�

Cyberattacks Successful of Likelihood Future

2022 Cyberthreat Defense Report - Sponsored by (ISC)�

Cyberattacks Successful of Likelihood Future
ISC2
2022 Email Security Trends Report

2022 Email Security Trends Report

Managing risks amidst the changing threat landscape

2022 Email Security Trends Report

Managing risks amidst the changing threat landscape
Abnormal Security
2022 The State of Application Data Privacy and Security

2022 The State of Application Data Privacy and Security

Dark Reading Research

2022 The State of Application Data Privacy and Security

Dark Reading Research
Skyflow
2022 Zscaler ThreatLabs State of Ransomware Report

2022 Zscaler ThreatLabs State of Ransomware Report

Ransomware is a type of malware cybercriminals use to disrupt a victim’s organization.

2022 Zscaler ThreatLabs State of Ransomware Report

Ransomware is a type of malware cybercriminals use to disrupt a victim’s organization.
Zscaler
3 Approaches to Breach and Attack Simulation

3 Approaches to Breach and Attack Simulation

Read Now

3 Approaches to Breach and Attack Simulation

Read Now
Cymulate
5 Critical Cyber Range Exercises from the Experts

5 Critical Cyber Range Exercises from the Experts

What Is a Cyber Range?

5 Critical Cyber Range Exercises from the Experts

What Is a Cyber Range?
SimSpace
5 Reasons You Should Rethink Your SIEM Strategy

5 Reasons You Should Rethink Your SIEM Strategy

Traditional SIEMs no longer meet the growing needs of security pros who face new and emerging threats. So what does this future revolution of SIEM technology look like?

5 Reasons You Should Rethink Your SIEM Strategy

Traditional SIEMs no longer meet the growing needs of security pros who face new and emerging threats. So what does this future revolution of SIEM technology look like?
Panther
5 Steps for Successful VPN to ZTNA Migration

5 Steps for Successful VPN to ZTNA Migration

This eBook provides guidance on the five steps organizations can take to successfully transition from VPN to ZTNA, including best practices that minimize business disruption.

5 Steps for Successful VPN to ZTNA Migration

This eBook provides guidance on the five steps organizations can take to successfully transition from VPN to ZTNA, including best practices that minimize business disruption.
Appgate
7 Experts on Building and Maintaining Cyber Resilience

7 Experts on Building and Maintaining Cyber Resilience

Cyber Resilience Challenges Facing Financial Services Firms

7 Experts on Building and Maintaining Cyber Resilience

Cyber Resilience Challenges Facing Financial Services Firms
Trustwave
A Business Guide to Data Breaches and Hacks

A Business Guide to Data Breaches and Hacks

The dynamic threat landscape

A Business Guide to Data Breaches and Hacks

The dynamic threat landscape
Dashlane
A Case for Evaluating Security After the Cloud Rush

A Case for Evaluating Security After the Cloud Rush

CBI helps organization gain visibility into its cloud security status

A Case for Evaluating Security After the Cloud Rush

CBI helps organization gain visibility into its cloud security status
CreativeBreakthroughs
A Case for Secure-by-Design Cloud Transformation

A Case for Secure-by-Design Cloud Transformation

CBI guides organization on a secure journey to 100% cloud-hosted data centers

A Case for Secure-by-Design Cloud Transformation

CBI guides organization on a secure journey to 100% cloud-hosted data centers
CreativeBreakthroughs
A Detailed Comparison: ZTNA vs On-Premises Firewall VPN

A Detailed Comparison: ZTNA vs On-Premises Firewall VPN

Securing Today’s Remote Workspaces

A Detailed Comparison: ZTNA vs On-Premises Firewall VPN

Securing Today’s Remote Workspaces
Perimeter 81
A Guide to API Security

A Guide to API Security

APIs make the (app) world go round

A Guide to API Security

APIs make the (app) world go round
Cloudflare
A Perfect Storm for Social Engineering: Anticipating the Human Factor in Post-Pandemic Cybersecurity

A Perfect Storm for Social Engineering: Anticipating the Human Factor in Post-Pandemic Cybersecurity

Human factors and the human-computer interface are central component of cybersecurity

A Perfect Storm for Social Engineering: Anticipating the Human Factor in Post-Pandemic Cybersecurity

Human factors and the human-computer interface are central component of cybersecurity
Abnormal Security
A Practical Guide for Shields Up - For Organizations

A Practical Guide for Shields Up - For Organizations

Advice for Organizations in Implementing CISA’s Cybersecurity Doctrine to Defend your Enterprise

A Practical Guide for Shields Up - For Organizations

Advice for Organizations in Implementing CISA’s Cybersecurity Doctrine to Defend your Enterprise
ExtraHop
A Step-by-Step Guide to Achieve Vulnerability Management Maturity

A Step-by-Step Guide to Achieve Vulnerability Management Maturity

This eBook establishes the first vulnerability management maturity model to advance several levels beyond simple vulnerability scanning or prioritization.

A Step-by-Step Guide to Achieve Vulnerability Management Maturity

This eBook establishes the first vulnerability management maturity model to advance several levels beyond simple vulnerability scanning or prioritization.
Vulcan Cyber
A Zero Trust Approach to Secure Access

A Zero Trust Approach to Secure Access

Protecting Privileged Access for All Remote Sessions

A Zero Trust Approach to Secure Access

Protecting Privileged Access for All Remote Sessions
BeyondTrust
AI in Cybersecurity

AI in Cybersecurity

Using artificial intelligence to mitigate emerging security risks

AI in Cybersecurity

Using artificial intelligence to mitigate emerging security risks
Penfield AI
An Executive's Guide to Industrial Cybersecurity

An Executive's Guide to Industrial Cybersecurity

Download this guide to discover more about the importance of industrial cybersecurity.

An Executive's Guide to Industrial Cybersecurity

Download this guide to discover more about the importance of industrial cybersecurity.
Dragos
Analyzing Identity Risks (AIR) 2022

Analyzing Identity Risks (AIR) 2022

Illuminating identity risks that leave every organization vulnerable to attack

Analyzing Identity Risks (AIR) 2022

Illuminating identity risks that leave every organization vulnerable to attack
Illusive
Applying Zero Trust Principles to Devices

Applying Zero Trust Principles to Devices

Seven Best Practices to Protect Critical IT Resources from Vulnerable Devices

Applying Zero Trust Principles to Devices

Seven Best Practices to Protect Critical IT Resources from Vulnerable Devices
Infinipoint
AppSec Best Practices: Where Speed, Security, and Innovation Meet in the Middle

AppSec Best Practices: Where Speed, Security, and Innovation Meet in the Middle

In the race to innovation, security is getting left in the dust

AppSec Best Practices: Where Speed, Security, and Innovation Meet in the Middle

In the race to innovation, security is getting left in the dust
Invicti
AppSec Considerations For Modern Application Development(MAD)

AppSec Considerations For Modern Application Development(MAD)

A Comprehensive Guide for Leaders and Practitioners -- Part 3

AppSec Considerations For Modern Application Development(MAD)

A Comprehensive Guide for Leaders and Practitioners -- Part 3
Checkmarx
AppSec Shift Left Progress Report

AppSec Shift Left Progress Report

A Study on Enterprise Application Security

AppSec Shift Left Progress Report

A Study on Enterprise Application Security
Shiftleft
Architecting and Managing Hybrid and Cloudbased Identity Services

Architecting and Managing Hybrid and Cloudbased Identity Services

TechVision Research Reprint

Architecting and Managing Hybrid and Cloudbased Identity Services

TechVision Research Reprint
Radiant Logic
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.