Cybersecurity Resource Library

The #1 source for free Cybersecurity reports, whitepapers, webinars, research and more.

Showing results 151 - 180 of 921
Showing results 151 - 180 of 921

Filter by

Filters

Unleash the Power of Gen AI for Application Development, Securely

Unleash the Power of Gen AI for Application Development, Securely

Available On-Demand

Unleash the Power of Gen AI for Application Development, Securely

Available On-Demand
Snyk
How Hackers Execute Mobile Attacks

How Hackers Execute Mobile Attacks

View the report explaining the anatomy of mobile attacks and discover security measures.

How Hackers Execute Mobile Attacks

View the report explaining the anatomy of mobile attacks and discover security measures.
Zimperium
Mobile Banking Heist Report

Mobile Banking Heist Report

Banking trojans continue to evolve and succeed due to their ability to persist, bypass security, and evade detection on mobile devices. In this report, Zimperium shares insights on how to develop mobile app security strategies that align with today's sophisticated malware.

Mobile Banking Heist Report

Banking trojans continue to evolve and succeed due to their ability to persist, bypass security, and evade detection on mobile devices. In this report, Zimperium shares insights on how to develop mobile app security strategies that align with today's sophisticated malware.
Zimperium
OWASP Mobile Top 10 List: Why Publish a Separate List for Mobile?

OWASP Mobile Top 10 List: Why Publish a Separate List for Mobile?

OWASPs top 10 lists reveal the biggest risks and the best mitigation strategies. Learn why they’re important and why there are different lists for web apps and mobile apps.

OWASP Mobile Top 10 List: Why Publish a Separate List for Mobile?

OWASPs top 10 lists reveal the biggest risks and the best mitigation strategies. Learn why they’re important and why there are different lists for web apps and mobile apps.
Zimperium
State of Mobile App Security

State of Mobile App Security

Mobile apps have rapidly transformed; with improved internet speeds and the global demand for instant access to data and services, mobile apps have become a dominant form of digital interaction in our work and personal lives, discover in Zimperium's report.

State of Mobile App Security

Mobile apps have rapidly transformed; with improved internet speeds and the global demand for instant access to data and services, mobile apps have become a dominant form of digital interaction in our work and personal lives, discover in Zimperium's report.
Zimperium
Zimperium Secures Connected Apps for Leading Medical Device Manufacturer

Zimperium Secures Connected Apps for Leading Medical Device Manufacturer

Discover how Zimperium helped a major healthcare and pharmaceutical manufacturer secure their connected apps all while protecting patient data, complying with FDA security requirements and more.

Zimperium Secures Connected Apps for Leading Medical Device Manufacturer

Discover how Zimperium helped a major healthcare and pharmaceutical manufacturer secure their connected apps all while protecting patient data, complying with FDA security requirements and more.
Zimperium
2023 Threat Detection Report

2023 Threat Detection Report

Understand prevalent trends, cyber threats, and adversary techniques.

2023 Threat Detection Report

Understand prevalent trends, cyber threats, and adversary techniques.
Red Canary
Executive Summary: Incident Response & Readiness

Executive Summary: Incident Response & Readiness

What security leadership needs to know right now

Executive Summary: Incident Response & Readiness

What security leadership needs to know right now
Red Canary
Incident Response & Readiness Guide

Incident Response & Readiness Guide

Timing and response plans could mean the difference between an attempted attack or full-blown compromise. This guide arms security teams with the blueprint for a modern and effective incident response plan.

Incident Response & Readiness Guide

Timing and response plans could mean the difference between an attempted attack or full-blown compromise. This guide arms security teams with the blueprint for a modern and effective incident response plan.
Red Canary
MDR Buyer's Guide

MDR Buyer's Guide

When evaluating MDR vendors, organizations should consider several elements, from the provider’s investigation and response capabilities to their depth of detection and beyond.

MDR Buyer's Guide

When evaluating MDR vendors, organizations should consider several elements, from the provider’s investigation and response capabilities to their depth of detection and beyond.
Red Canary
5 Pragmatic Tips for Preventing Ransomware

5 Pragmatic Tips for Preventing Ransomware

Available On-Demand

5 Pragmatic Tips for Preventing Ransomware

Available On-Demand
Gigamon
Quickly Respond to Attacks Across Your Network

Quickly Respond to Attacks Across Your Network

Detect and stop threats faster with FortiNDR

Quickly Respond to Attacks Across Your Network

Detect and stop threats faster with FortiNDR
Fortinet
Understanding Today's Threat Actors

Understanding Today's Threat Actors

Threats of all shapes and sizes are putting organizations everywhere at risk. As a result, traditional security controls are no longer sufficient for protecting your organization.

Understanding Today's Threat Actors

Threats of all shapes and sizes are putting organizations everywhere at risk. As a result, traditional security controls are no longer sufficient for protecting your organization.
Fortinet
Use the 2023 MITRE ATT&CK� Evaluation Results for Turla to Inform EDR Buying Decisions

Use the 2023 MITRE ATT&CK� Evaluation Results for Turla to Inform EDR Buying Decisions

Organizations need new tools to defend against today's threat landscape.

Use the 2023 MITRE ATT&CK� Evaluation Results for Turla to Inform EDR Buying Decisions

Organizations need new tools to defend against today's threat landscape.
Fortinet
Assessing Your Critical Applications' Cyber Defenses

Assessing Your Critical Applications' Cyber Defenses

Available On-Demand

Assessing Your Critical Applications' Cyber Defenses

Available On-Demand
Mandiant
Building a Modern Endpoint Strategy for 2024 and Beyond

Building a Modern Endpoint Strategy for 2024 and Beyond

Available On-Demand

Building a Modern Endpoint Strategy for 2024 and Beyond

Available On-Demand
Sophos
CNAPP for Dummies

CNAPP for Dummies

Everything you need to know to secure the changing landscape of CNAPP

CNAPP for Dummies

Everything you need to know to secure the changing landscape of CNAPP
Wiz
Empower Digital Transformation by Protecting Converged IT and OT

Empower Digital Transformation by Protecting Converged IT and OT

Security for Connected Industrial Environments

Empower Digital Transformation by Protecting Converged IT and OT

Security for Connected Industrial Environments
Fortinet
Kubernetes Security for Dummies

Kubernetes Security for Dummies

Discover new approaches to securing your containerized apps and Kubernetes clusters in this user-friendly book.

Kubernetes Security for Dummies

Discover new approaches to securing your containerized apps and Kubernetes clusters in this user-friendly book.
Wiz
Security Assessment Sample Report

Security Assessment Sample Report

sample assessment report for the types of security insights Wiz provides you with

Security Assessment Sample Report

sample assessment report for the types of security insights Wiz provides you with
Wiz
State of AI in the Cloud 2024

State of AI in the Cloud 2024

Exclusive insights on what 150,000+ cloud accounts revealed about the AI surge.

State of AI in the Cloud 2024

Exclusive insights on what 150,000+ cloud accounts revealed about the AI surge.
Wiz
The 2023 Kubernetes Security Report

The 2023 Kubernetes Security Report

Wiz Security Research team exposes how many clusters are at risk, and what it means for your cloud defense.

The 2023 Kubernetes Security Report

Wiz Security Research team exposes how many clusters are at risk, and what it means for your cloud defense.
Wiz
Why CISOs Need an OT Security Platform

Why CISOs Need an OT Security Platform

Meet strategic security goals

Why CISOs Need an OT Security Platform

Meet strategic security goals
Fortinet
Cyber-Proof Petabytes of NAS Data at Scale with Rubrik and AWS

Cyber-Proof Petabytes of NAS Data at Scale with Rubrik and AWS

Available On-Demand

Cyber-Proof Petabytes of NAS Data at Scale with Rubrik and AWS

Available On-Demand
Rubrik
EMA: AI at your fingertips: How Elastic AI Assistant simplifies cybersecurity

EMA: AI at your fingertips: How Elastic AI Assistant simplifies cybersecurity

AI assistants for cybersecurity use cases are a force-multiplier for organizations seeking to navigate complex cybersecurity landscapes and optimize analyst workloads.

EMA: AI at your fingertips: How Elastic AI Assistant simplifies cybersecurity

AI assistants for cybersecurity use cases are a force-multiplier for organizations seeking to navigate complex cybersecurity landscapes and optimize analyst workloads.
Elastic
How Supply Chain Attacks Work -- And How to Stop Them

How Supply Chain Attacks Work -- And How to Stop Them

| Live Webinar | Thursday, March 7, 2024 | 1pm ET |

How Supply Chain Attacks Work -- And How to Stop Them

| Live Webinar | Thursday, March 7, 2024 | 1pm ET |
JFrog
2023 Global Cyber Confidence Index

2023 Global Cyber Confidence Index

Learn how cybersecurity debt drives up costs and ransomware risk.

2023 Global Cyber Confidence Index

Learn how cybersecurity debt drives up costs and ransomware risk.
ExtraHop
The Crisis of Convergence: OT/ICS Cybersecurity in 2023

The Crisis of Convergence: OT/ICS Cybersecurity in 2023

Events in the threat landscape have escalated significantly within the industrial manufacturing and critical infrastructure sectors, leading to destruction, economic loss, and endangerment of human safety.

The Crisis of Convergence: OT/ICS Cybersecurity in 2023

Events in the threat landscape have escalated significantly within the industrial manufacturing and critical infrastructure sectors, leading to destruction, economic loss, and endangerment of human safety.
TXOne Networks
The Generative AI Tipping Point

The Generative AI Tipping Point

Learn, from over 1,200 security and IT leaders, how organizations around the world are handling the latest developments in generative AI.

The Generative AI Tipping Point

Learn, from over 1,200 security and IT leaders, how organizations around the world are handling the latest developments in generative AI.
ExtraHop
The True Cost of a Security Breach

The True Cost of a Security Breach

Examine the cost analysis of high profile data breaches that destroyed earnings.

The True Cost of a Security Breach

Examine the cost analysis of high profile data breaches that destroyed earnings.
ExtraHop
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.