Sponsored By

Cybersecurity Resource Library

The #1 source for free Cybersecurity reports, whitepapers, webinars, research and more.

Showing results 91 - 120 of 813
Showing results 91 - 120 of 813

Filter by

Filters

The Keys to Successfully Securing Cloud-Native Environments

The Keys to Successfully Securing Cloud-Native Environments

As the use of cloud computing rises, so does the complexity of these environments and the volume of attacks targeting cloud systems. As the ability to spin up infrastructure becomes more decentralized, a new generation of vulnerabilities and risks are created in misdelivery, misconfiguration, and publishing errors. This is the world enterprise security teams find themselves as they work to secure their cloud systems. Here is how to secure cloud-native systems and development pipelines.

The Keys to Successfully Securing Cloud-Native Environments

As the use of cloud computing rises, so does the complexity of these environments and the volume of attacks targeting cloud systems. As the ability to spin up infrastructure becomes more decentralized, a new generation of vulnerabilities and risks are created in misdelivery, misconfiguration, and publishing errors. This is the world enterprise security teams find themselves as they work to secure their cloud systems. Here is how to secure cloud-native systems and development pipelines.
Palo Alto Networks
Elevating Your Data Security Game: Strengthening Your Security Posture Against Cyber Threats

Elevating Your Data Security Game: Strengthening Your Security Posture Against Cyber Threats

Available On-Demand

Elevating Your Data Security Game: Strengthening Your Security Posture Against Cyber Threats

Available On-Demand
Rubrik
The State of Generative AI in the Enterprise

The State of Generative AI in the Enterprise

With the sudden increase in organizations embracing generative AI tools, cybersecurity professionals are employing multiple strategies to mitigate risks to privacy, security, and regulatory compliance issues.

The State of Generative AI in the Enterprise

With the sudden increase in organizations embracing generative AI tools, cybersecurity professionals are employing multiple strategies to mitigate risks to privacy, security, and regulatory compliance issues.
Blink Ops
Finding Issues that Matter in Open Source Dependencies and Fixing them Without Developer Friction

Finding Issues that Matter in Open Source Dependencies and Fixing them Without Developer Friction

Available On-Demand

Finding Issues that Matter in Open Source Dependencies and Fixing them Without Developer Friction

Available On-Demand
Semgrep
Gartner Critical Capabilities for Application Security Testing 2023

Gartner Critical Capabilities for Application Security Testing 2023

Arm Yourself with the 2023 Critical Capabilities for Application Security Testing

Gartner Critical Capabilities for Application Security Testing 2023

Arm Yourself with the 2023 Critical Capabilities for Application Security Testing
OpenText
Gartner Magic Quadrant for Application Security Testing 2023

Gartner Magic Quadrant for Application Security Testing 2023

Defend Your Applications: Insights from the 2023 Gartner Magic Quadrant for Application Security Testing

Gartner Magic Quadrant for Application Security Testing 2023

Defend Your Applications: Insights from the 2023 Gartner Magic Quadrant for Application Security Testing
OpenText
Increase Speed and Accuracy with AI Driven Static Analysis Auditing

Increase Speed and Accuracy with AI Driven Static Analysis Auditing

Leverage millions of past audit decisions to power AI assisted auditing

Increase Speed and Accuracy with AI Driven Static Analysis Auditing

Leverage millions of past audit decisions to power AI assisted auditing
OpenText
The Developers Guide to API Security

The Developers Guide to API Security

Learn how to defend against the ten most common and serious API security risks

The Developers Guide to API Security

Learn how to defend against the ten most common and serious API security risks
OpenText
The Need for a Software Bill of Materials

The Need for a Software Bill of Materials

Understand the health and security of your software dependencies

The Need for a Software Bill of Materials

Understand the health and security of your software dependencies
OpenText
The State of Code Security Report 2023

The State of Code Security Report 2023

Go prepared into the new year with The State of Code Security Report

The State of Code Security Report 2023

Go prepared into the new year with The State of Code Security Report
OpenText
2024 API Security Trends & Predictions: A Cloudflare discussion featuring Melinda Marks, ESG Senior Analyst

2024 API Security Trends & Predictions: A Cloudflare discussion featuring Melinda Marks, ESG Senior Analyst

| On-Demand | Wednesday, January 10, 2024 | 1pm ET |

2024 API Security Trends & Predictions: A Cloudflare discussion featuring Melinda Marks, ESG Senior Analyst

| On-Demand | Wednesday, January 10, 2024 | 1pm ET |
Cloudflare
The State of Vulnerability

The State of Vulnerability

While many organizations today run either formal or informal vulnerability management programs, they struggle to patch and mitigate most discovered bugs due to budget and staffing constraints.

The State of Vulnerability

While many organizations today run either formal or informal vulnerability management programs, they struggle to patch and mitigate most discovered bugs due to budget and staffing constraints.
JFrog
2023 Cloud Vulnerability Report

2023 Cloud Vulnerability Report

A comprehensive report on vulnerabilities in cloud environments

2023 Cloud Vulnerability Report

A comprehensive report on vulnerabilities in cloud environments
Wiz
FrostRadar™: Cloud-Native Application Protection Platforms, 2023

FrostRadar™: Cloud-Native Application Protection Platforms, 2023

A Benchmarking System to Spark Companies to Action-Innovation That Fuels New Deal Flowand Growth Pipelines

FrostRadar™: Cloud-Native Application Protection Platforms, 2023

A Benchmarking System to Spark Companies to Action-Innovation That Fuels New Deal Flowand Growth Pipelines
Wiz
How to Fortify OT Environments: Protecting Third-Party Remote Access

How to Fortify OT Environments: Protecting Third-Party Remote Access

In today's interconnected world, remote access to OT systems is crucial for efficiency, but it also presents security challenges that must be addressed

How to Fortify OT Environments: Protecting Third-Party Remote Access

In today's interconnected world, remote access to OT systems is crucial for efficiency, but it also presents security challenges that must be addressed
WALLIX
Wiz for Cloud Security Posture Management

Wiz for Cloud Security Posture Management

Why organizations need a CSPM

Wiz for Cloud Security Posture Management

Why organizations need a CSPM
Wiz
ASPM Checklist

ASPM Checklist

Application security posture management (ASPM) is taking the AppSec space by storm. Get a primer on ASPM solutions with this overview and checklist.

ASPM Checklist

Application security posture management (ASPM) is taking the AppSec space by storm. Get a primer on ASPM solutions with this overview and checklist.
Apiiro
Using Threat Intelligence to Transform Security Programs

Using Threat Intelligence to Transform Security Programs

Building a modern and effective cybersecurity team today means efficiently sharing cybersecurity intelligence. Cyber threat intelligence helps organizations maximize their digital defenses, respond better when attacks do occur, and even inform how to improve the overall security program. In years past, the challenge was finding threat intelligence. Now, it is finding useful signals in the data. Here’s how to get started.

Using Threat Intelligence to Transform Security Programs

Building a modern and effective cybersecurity team today means efficiently sharing cybersecurity intelligence. Cyber threat intelligence helps organizations maximize their digital defenses, respond better when attacks do occur, and even inform how to improve the overall security program. In years past, the challenge was finding threat intelligence. Now, it is finding useful signals in the data. Here’s how to get started.
Google Cloud
XBOM Checklist

XBOM Checklist

What is your SBOM missing? Download Apiiro's XBOM checklist to learn the 16 things you get with an eXtended Software Bill of materials that you don’t with SBOM.

XBOM Checklist

What is your SBOM missing? Download Apiiro's XBOM checklist to learn the 16 things you get with an eXtended Software Bill of materials that you don’t with SBOM.
Apiiro
Enterprise IoT and OT: 2023 Trends and Threats

Enterprise IoT and OT: 2023 Trends and Threats

IoT and OT are growing targets for cyberattacks. Watch this webinar to uncover the latest trends and threats.

Enterprise IoT and OT: 2023 Trends and Threats

IoT and OT are growing targets for cyberattacks. Watch this webinar to uncover the latest trends and threats.
Zscaler
Key Elements Enterprises Need to Include in Modern SecOps

Key Elements Enterprises Need to Include in Modern SecOps

Security teams are overhwlemed in the operations center. As the enterprise's first line of defense against an active attack, the security operatoins center sifts through theat intelligence, events data, logs, and activity reports from throughout the enterprise and key partners. How can CISOs give the SOC the necessary tools to effectively manage the systems and data? What will it take to unlock effective threat detection and master data collection and response for modern defense?

Key Elements Enterprises Need to Include in Modern SecOps

Security teams are overhwlemed in the operations center. As the enterprise's first line of defense against an active attack, the security operatoins center sifts through theat intelligence, events data, logs, and activity reports from throughout the enterprise and key partners. How can CISOs give the SOC the necessary tools to effectively manage the systems and data? What will it take to unlock effective threat detection and master data collection and response for modern defense?
Google Cloud
Migrations Playbook for Saving Money with Snyk + AWS

Migrations Playbook for Saving Money with Snyk + AWS

Snyk has helped customers gain an average ROI of $327,000 based purely on developer efficiency gains.

Migrations Playbook for Saving Money with Snyk + AWS

Snyk has helped customers gain an average ROI of $327,000 based purely on developer efficiency gains.
Snyk
What's In Your Cloud?

What's In Your Cloud?

| Live Webinar | Wednesday, January 17, 2024 | 1pm ET |

What's In Your Cloud?

| Live Webinar | Wednesday, January 17, 2024 | 1pm ET |
Prisma Cloud by Palo Alto Networks
Everything You Need to Know About DNS Attacks

Everything You Need to Know About DNS Attacks

| Live Webinar | Thursday, January 18, 2024 | 1pm ET |

Everything You Need to Know About DNS Attacks

| Live Webinar | Thursday, January 18, 2024 | 1pm ET |
Infoblox
DNS Encryption For CPE-based Security

DNS Encryption For CPE-based Security

Security providers face the challenge of dealing with encrypted DNS when filtering content on CPE. This can be solved by handling all DNS requests on the router. Learn more about enabling CPE-based security solutions for encrypted DNS.

DNS Encryption For CPE-based Security

Security providers face the challenge of dealing with encrypted DNS when filtering content on CPE. This can be solved by handling all DNS requests on the router. Learn more about enabling CPE-based security solutions for encrypted DNS.
PowerDNS
Network-based security with DNS

Network-based security with DNS

The growth in both internet traffic and the number of connected devices is expected to continue to increase rapidly over the coming years. This, coupled with an increased dependency on online tools, conferencing services, and the use of IoT devices, creates a very attractive situation for malicious activities.

Network-based security with DNS

The growth in both internet traffic and the number of connected devices is expected to continue to increase rapidly over the coming years. This, coupled with an increased dependency on online tools, conferencing services, and the use of IoT devices, creates a very attractive situation for malicious activities.
PowerDNS
Buyer's Guide: Choosing a True DevSecOps Solution for Your Apps on AWS

Buyer's Guide: Choosing a True DevSecOps Solution for Your Apps on AWS

AWS offers the infrastructure, services, innovation, and reliability to help run customer’s mission-critical applications, but customers require a trusted security partner as well.

Buyer's Guide: Choosing a True DevSecOps Solution for Your Apps on AWS

AWS offers the infrastructure, services, innovation, and reliability to help run customer’s mission-critical applications, but customers require a trusted security partner as well.
Snyk
Identity Security: Why It Matters and Why Now

Identity Security: Why It Matters and Why Now

Remove Risk by Taking a Unified Approach to Managing Identities

Identity Security: Why It Matters and Why Now

Remove Risk by Taking a Unified Approach to Managing Identities
CyberArk
Secure Access for the Identities Driving Your Key Initiatives

Secure Access for the Identities Driving Your Key Initiatives

Four Ways to Comprehensively Secure Employees’ and External B2B Users’ Identities

Secure Access for the Identities Driving Your Key Initiatives

Four Ways to Comprehensively Secure Employees’ and External B2B Users’ Identities
CyberArk
Three Barriers to Securing Todays Workforce and How to Remove Them

Three Barriers to Securing Todays Workforce and How to Remove Them

Anyone, from employees to vendors, can become privileged based on the sensitive resources they can access.

Three Barriers to Securing Todays Workforce and How to Remove Them

Anyone, from employees to vendors, can become privileged based on the sensitive resources they can access.
CyberArk
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.