Cybersecurity Resource Library

The #1 source for free Cybersecurity reports, whitepapers, webinars, research and more.

Showing results 91 - 120 of 921
Showing results 91 - 120 of 921

Filter by

Filters

SecOps Checklist

SecOps Checklist

Prepare your business for the age of AI.

SecOps Checklist

Prepare your business for the age of AI.
SentinelOne
Shining a light in the dark: observability and security, a SANS profile

Shining a light in the dark: observability and security, a SANS profile

Unifying observability and security unlocks a holistic view of environmental health and behavior, providing security teams the insight they need to detect and deter threats proactively

Shining a light in the dark: observability and security, a SANS profile

Unifying observability and security unlocks a holistic view of environmental health and behavior, providing security teams the insight they need to detect and deter threats proactively
Elastic
DevSecOps in the Cloud

DevSecOps in the Cloud

Wednesday, May 29 2024 at 1 PM EST

DevSecOps in the Cloud

Wednesday, May 29 2024 at 1 PM EST
Wiz
Network Visibility is the Foundation of Zero Trust

Network Visibility is the Foundation of Zero Trust

On Demand Webinar

Network Visibility is the Foundation of Zero Trust

On Demand Webinar
Gigamon
Outsourcing Security Without Inviting Risk and Wasting Money

Outsourcing Security Without Inviting Risk and Wasting Money

Few enterprises have all the cybersecurity skills and resources they need in-house, making outsourcing a necessity. Rather than trying to build an internal kingdom, it’s often more beneficial for midsize and large organizations to build their core team and strategically outsource specific capabilities. Experts weigh in on how to select and work with third-party security service providers

Outsourcing Security Without Inviting Risk and Wasting Money

Few enterprises have all the cybersecurity skills and resources they need in-house, making outsourcing a necessity. Rather than trying to build an internal kingdom, it’s often more beneficial for midsize and large organizations to build their core team and strategically outsource specific capabilities. Experts weigh in on how to select and work with third-party security service providers
HID Global Corporation
LogicGate Named a 'Leader' in The Forrester Wave™: Governance, Risk, And Compliance Platforms

LogicGate Named a 'Leader' in The Forrester Wave™: Governance, Risk, And Compliance Platforms

The Wave is an incredibly detailed report, built on data-driven evaluations of GRC vendors and widely considered one of the top GRC platform evaluation lists.

LogicGate Named a 'Leader' in The Forrester Wave™: Governance, Risk, And Compliance Platforms

The Wave is an incredibly detailed report, built on data-driven evaluations of GRC vendors and widely considered one of the top GRC platform evaluation lists.
LogicGate
Risk Cloud by LogicGate: A Next-Generation, Integrated, GRC Management Platform

Risk Cloud by LogicGate: A Next-Generation, Integrated, GRC Management Platform

Organizations need 360° contextual awareness of governance, risk, and compliance to understand their collective impact on business objectives. Old technology paradigms of GRC no longer work; today's organization requires holistic visibility and contextual awareness.

Risk Cloud by LogicGate: A Next-Generation, Integrated, GRC Management Platform

Organizations need 360° contextual awareness of governance, risk, and compliance to understand their collective impact on business objectives. Old technology paradigms of GRC no longer work; today's organization requires holistic visibility and contextual awareness.
LogicGate
Threat Hunting's Evolution: From On-Premise to the Cloud

Threat Hunting's Evolution: From On-Premise to the Cloud

Wednesday, June 5, 2024; at 1 PM EDT | Brought to you by LogRhythm

Threat Hunting's Evolution: From On-Premise to the Cloud

Wednesday, June 5, 2024; at 1 PM EDT | Brought to you by LogRhythm
LogRhythm
Assessing Software Supply Chain Risk

Assessing Software Supply Chain Risk

Thursday, June 6, 2024 at 1 PM EDT | Brought to you by Apiiro

Assessing Software Supply Chain Risk

Thursday, June 6, 2024 at 1 PM EDT | Brought to you by Apiiro
Apiiro
Chapter 3: Creating a Risk Based Blueprint

Chapter 3: Creating a Risk Based Blueprint

Over the last few years, software engineering teams have adopted a “shift left” attitude. In many cases -- in no small part, because of our work here at Snyk -- developers understand that taking on some security responsibilities as they develop will help them move faster, not slower.

Chapter 3: Creating a Risk Based Blueprint

Over the last few years, software engineering teams have adopted a “shift left” attitude. In many cases -- in no small part, because of our work here at Snyk -- developers understand that taking on some security responsibilities as they develop will help them move faster, not slower.
Snyk
Chapter 4: AppSec Threats Deserve their Own Incident Response

Chapter 4: AppSec Threats Deserve their Own Incident Response

The cybersecurity ecosystem and industry at large have been inundated with warnings about this attack vector, with high-profile incidents leading to a stark increase in vendor solutions, and government regulations keep trying to catch up.

Chapter 4: AppSec Threats Deserve their Own Incident Response

The cybersecurity ecosystem and industry at large have been inundated with warnings about this attack vector, with high-profile incidents leading to a stark increase in vendor solutions, and government regulations keep trying to catch up.
Snyk
Okta Privileged Access Solution Brief

Okta Privileged Access Solution Brief

Achieve stronger security, faster compliance, and enhanced productivity through a unified Identity strategy.

Okta Privileged Access Solution Brief

Achieve stronger security, faster compliance, and enhanced productivity through a unified Identity strategy.
Okta
Why Effective Asset Management is Critical to Enterprise Cybersecurity

Why Effective Asset Management is Critical to Enterprise Cybersecurity

Available On-Demand

Why Effective Asset Management is Critical to Enterprise Cybersecurity

Available On-Demand
Panaseer
2024 PKI & Digital Trust Report -- The Year of Disruption

2024 PKI & Digital Trust Report -- The Year of Disruption

Digital trust is critical in our hyper-connected world. Learn why IT and security leaders are prioritizing digital trust in the face of disruptive changes, such as AI, IoT, and quantum computing.

2024 PKI & Digital Trust Report -- The Year of Disruption

Digital trust is critical in our hyper-connected world. Learn why IT and security leaders are prioritizing digital trust in the face of disruptive changes, such as AI, IoT, and quantum computing.
Keyfactor
Is AI Identifying Threats to Your Network?

Is AI Identifying Threats to Your Network?

Tuesday, May 14, 2024 at 1pm EDT |Brought to you by Dark Reading

Is AI Identifying Threats to Your Network?

Tuesday, May 14, 2024 at 1pm EDT |Brought to you by Dark Reading
OpenText
Finding Your Way on the Path to Zero Trust

Finding Your Way on the Path to Zero Trust

Available On-Demand

Finding Your Way on the Path to Zero Trust

Available On-Demand
ExtraHop
Managing Risk at Scale: How to Gain Visibility, Quiet the Noise, and Secure Applications Across the Enterprise

Managing Risk at Scale: How to Gain Visibility, Quiet the Noise, and Secure Applications Across the Enterprise

Effectively managing software application risk for the enterprise requires teams to think across all business units and organizational silos, monitoring thousands of applications growing in volume and sophistication. Today’s organizations must embrace a “shift everywhere” approach, driven by tight integrations throughout the SDLC, intelligent automation, a consistent implementation of security policies, and access to the correct tools and resources to secure software applications at scale.

Managing Risk at Scale: How to Gain Visibility, Quiet the Noise, and Secure Applications Across the Enterprise

Effectively managing software application risk for the enterprise requires teams to think across all business units and organizational silos, monitoring thousands of applications growing in volume and sophistication. Today’s organizations must embrace a “shift everywhere” approach, driven by tight integrations throughout the SDLC, intelligent automation, a consistent implementation of security policies, and access to the correct tools and resources to secure software applications at scale.
Synopsys
Safeguarding Political Campaigns: Defending Against Mass Phishing Attacks

Safeguarding Political Campaigns: Defending Against Mass Phishing Attacks

Thursday, May 16, 2024 at 1 PM EST

Safeguarding Political Campaigns: Defending Against Mass Phishing Attacks

Thursday, May 16, 2024 at 1 PM EST
Sophos
Where and Why Threat Intelligence Makes Sense for Your Enterprise Security Strategy

Where and Why Threat Intelligence Makes Sense for Your Enterprise Security Strategy

Wednesday, May 15, 2024 at 1 PM EDT | Brought to you by Dark Reading

Where and Why Threat Intelligence Makes Sense for Your Enterprise Security Strategy

Wednesday, May 15, 2024 at 1 PM EDT | Brought to you by Dark Reading
Infoblox
Annual Cyber Threat Trends Report

Annual Cyber Threat Trends Report

Insights, emerging threats, and their potential impact. Prepare your organization for the likely cybersecurity threats to come.

Annual Cyber Threat Trends Report

Insights, emerging threats, and their potential impact. Prepare your organization for the likely cybersecurity threats to come.
Deloitte
Digital Trust Maturity Survey

Digital Trust Maturity Survey

Earning and building greater digital trust through cyber. Learn how leading organizations are taking proactive measures to increase integrity and boost confidence across their business landscapes.

Digital Trust Maturity Survey

Earning and building greater digital trust through cyber. Learn how leading organizations are taking proactive measures to increase integrity and boost confidence across their business landscapes.
Deloitte
The CISO's Guide to Gen AI

The CISO's Guide to Gen AI

Gen AI is a game changer in cybersecurity. Deloitte's guide for CISOs explores the transformative potential of collaborative intelligence between humans and machines.

The CISO's Guide to Gen AI

Gen AI is a game changer in cybersecurity. Deloitte's guide for CISOs explores the transformative potential of collaborative intelligence between humans and machines.
Deloitte
Understanding SEC Requirements for Cybersecurity Disclosures

Understanding SEC Requirements for Cybersecurity Disclosures

On July 26, 2023, the SEC issued a final rule requiring improved and uniform disclosures about cybersecurity risks, strategies, governance, and incidents by registrants. The rule responds to growing concerns about consistent investor access to cybersecurity information due to digital tech, AI, hybrid work setups, crypto use, and rising illicit profits from cyber threats, amplifying overall cybersecurity risk and costs. Here are steps you can take to help prepare and comply.

Understanding SEC Requirements for Cybersecurity Disclosures

On July 26, 2023, the SEC issued a final rule requiring improved and uniform disclosures about cybersecurity risks, strategies, governance, and incidents by registrants. The rule responds to growing concerns about consistent investor access to cybersecurity information due to digital tech, AI, hybrid work setups, crypto use, and rising illicit profits from cyber threats, amplifying overall cybersecurity risk and costs. Here are steps you can take to help prepare and comply.
Deloitte
[Playbook] Chapter 1: Managing and Scaling an AppSec Program with ASPM

[Playbook] Chapter 1: Managing and Scaling an AppSec Program with ASPM

Unlock your organization’s security potential now with Snyk’s playbook on Managing and Scaling an AppSec Program with ASPM.

[Playbook] Chapter 1: Managing and Scaling an AppSec Program with ASPM

Unlock your organization’s security potential now with Snyk’s playbook on Managing and Scaling an AppSec Program with ASPM.
Snyk
[Playbook] Chapter 2: An AppSec Insight: Visibility & Coverage

[Playbook] Chapter 2: An AppSec Insight: Visibility & Coverage

Discover how to secure your software assets effectively!

[Playbook] Chapter 2: An AppSec Insight: Visibility & Coverage

Discover how to secure your software assets effectively!
Snyk
Phishing Frenzy

Phishing Frenzy

Navigating the Stormy Seas of Email Security

Phishing Frenzy

Navigating the Stormy Seas of Email Security
Abacode Cybersecurity & Compliance
How Enterprises Secure Their Applications

How Enterprises Secure Their Applications

Organizations are boldly embracing AppSec practices and focusing on their software security posture, but age-old problems of insufficient funding and security resources remain major roadblocks. Learn more in this in-depth research report.

How Enterprises Secure Their Applications

Organizations are boldly embracing AppSec practices and focusing on their software security posture, but age-old problems of insufficient funding and security resources remain major roadblocks. Learn more in this in-depth research report.
OpenText
The fuel in the new AI race: Data

The fuel in the new AI race: Data

Tuesday, April 23 at 1:00pm EST | Brought to you by Rubrik

The fuel in the new AI race: Data

Tuesday, April 23 at 1:00pm EST | Brought to you by Rubrik
Rubrik
CMMC Compliance and Managed Services

CMMC Compliance and Managed Services

Empower Your Defense Supply Chain with CMMC Compliance: Elevate Cybersecurity Maturity, Gain Trust, and Secure Future Contracts.

CMMC Compliance and Managed Services

Empower Your Defense Supply Chain with CMMC Compliance: Elevate Cybersecurity Maturity, Gain Trust, and Secure Future Contracts.
Abacode Cybersecurity & Compliance
Endpoint Detection & Response (EDR)

Endpoint Detection & Response (EDR)

Securing Tomorrow: A Deep Dive into Evolving Endpoint Protection Solutions and the Pinnacle Players in Cybersecurity

Endpoint Detection & Response (EDR)

Securing Tomorrow: A Deep Dive into Evolving Endpoint Protection Solutions and the Pinnacle Players in Cybersecurity
Abacode Cybersecurity & Compliance
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.