Cybersecurity Resource Library

The #1 source for free Cybersecurity reports, whitepapers, webinars, research and more.

Showing results 151 - 180 of 1024
Showing results 151 - 180 of 1024

Filter by

Filters

Gartner Leader's Guide to Software Supply Chain Security

Gartner Leader's Guide to Software Supply Chain Security

Software supply chain security is a critical risk and compliance issue, but most organizations approach it in a fragmented way.

Gartner Leader's Guide to Software Supply Chain Security

Software supply chain security is a critical risk and compliance issue, but most organizations approach it in a fragmented way.
OpenText
Gartner Magic Quadrant for Application Security Testing

Gartner Magic Quadrant for Application Security Testing

When it comes to application security, it’s important to align yourself with an experienced partner you can trust.

Gartner Magic Quadrant for Application Security Testing

When it comes to application security, it’s important to align yourself with an experienced partner you can trust.
OpenText
IDC White Paper: The Peril and Promise of Generative AI in Application Security

IDC White Paper: The Peril and Promise of Generative AI in Application Security

As the adoption of generative AI (GenAI) accelerates, so does the frequency and sophistication of attacks on AI systems.

IDC White Paper: The Peril and Promise of Generative AI in Application Security

As the adoption of generative AI (GenAI) accelerates, so does the frequency and sophistication of attacks on AI systems.
OpenText
Dependency Automation: Developer Delight & Security Satisfaction

Dependency Automation: Developer Delight & Security Satisfaction

Tuesday, October 1, 2024 at 1 PM EDT

Dependency Automation: Developer Delight & Security Satisfaction

Tuesday, October 1, 2024 at 1 PM EDT
Mend
How to Find Your Most Critical Risks in the Cloud

How to Find Your Most Critical Risks in the Cloud

Wednesday, October 9, 2024 at 1:00pm EDT

How to Find Your Most Critical Risks in the Cloud

Wednesday, October 9, 2024 at 1:00pm EDT
Wiz
DORA and PCI DSS 4.0: Scale Your Mainframe Security Strategy Among Evolving Regulations

DORA and PCI DSS 4.0: Scale Your Mainframe Security Strategy Among Evolving Regulations

Thursday, September 26, 2024 at 1PM EDT

DORA and PCI DSS 4.0: Scale Your Mainframe Security Strategy Among Evolving Regulations

Thursday, September 26, 2024 at 1PM EDT
Rocket Software
Achieving CMMC Compliance with CTEM

Achieving CMMC Compliance with CTEM

Achieve CMMC compliance with ease by leveraging Continuous Threat Exposure Management (CTEM). Discover actionable strategies to enhance your security posture and safeguard sensitive data from evolving threats

Achieving CMMC Compliance with CTEM

Achieve CMMC compliance with ease by leveraging Continuous Threat Exposure Management (CTEM). Discover actionable strategies to enhance your security posture and safeguard sensitive data from evolving threats
Praetorian
Achieving NYDFS Compliance with CTEM

Achieving NYDFS Compliance with CTEM

Enhance your cybersecurity strategy with CTEM to meet NYDFS requirements! Proactively identify threats and manage risks while ensuring compliance.

Achieving NYDFS Compliance with CTEM

Enhance your cybersecurity strategy with CTEM to meet NYDFS requirements! Proactively identify threats and manage risks while ensuring compliance.
Praetorian
Continuous Threat Exposure Management (CTEM) and NIST SP 800-171 Compliance

Continuous Threat Exposure Management (CTEM) and NIST SP 800-171 Compliance

Align the proactive approach of CTEM with the latest NIST guidelines, through real-world insights and actionable strategies to strengthen your security posture, ensure compliance, and safeguard sensitive data against evolving threats.

Continuous Threat Exposure Management (CTEM) and NIST SP 800-171 Compliance

Align the proactive approach of CTEM with the latest NIST guidelines, through real-world insights and actionable strategies to strengthen your security posture, ensure compliance, and safeguard sensitive data against evolving threats.
Praetorian
CTEM - A Blueprint to Modern Cybersecurity Testing

CTEM - A Blueprint to Modern Cybersecurity Testing

Cut through the Noise to Focus on the Risk. Discover practical strategies, advice, and guidance to transform your Traditional Vulnerability Management practice into a Countinuous Threate Exposure Management (CTEM) strategy.

CTEM - A Blueprint to Modern Cybersecurity Testing

Cut through the Noise to Focus on the Risk. Discover practical strategies, advice, and guidance to transform your Traditional Vulnerability Management practice into a Countinuous Threate Exposure Management (CTEM) strategy.
Praetorian
Diagnosing the Healthcare Attack Surface

Diagnosing the Healthcare Attack Surface

Learn how an continuous offensive strategies can protect sensitive data in the highly complex and vulnerable environment of a healthcare system.

Diagnosing the Healthcare Attack Surface

Learn how an continuous offensive strategies can protect sensitive data in the highly complex and vulnerable environment of a healthcare system.
Praetorian
Digging Out of Your Organization's Technical Debt

Digging Out of Your Organization's Technical Debt

Poor cybersecurity hygiene, legacy systems, out-of-date software, and poor patching make IT security difficult. Experts weigh in on who can help with assessing enterprise technical debt and coming up with a plan to dig you, and your enterprise, out.

Digging Out of Your Organization's Technical Debt

Poor cybersecurity hygiene, legacy systems, out-of-date software, and poor patching make IT security difficult. Experts weigh in on who can help with assessing enterprise technical debt and coming up with a plan to dig you, and your enterprise, out.
DataBee
Digging Out of Your Organization's Technical Debt: Executive Summary

Digging Out of Your Organization's Technical Debt: Executive Summary

This is an executive summary of the “Digging Out of Your Organization's Technical Debt” webinar that took place 08/14/2024. The speakers were Roselle Safran, Cybersecurity Expert and Entrepreneur, and Jill Cagliostro, Director 1, Product Management. The webinar was moderated by Becky Bracken, editor at Dark Reading.

Digging Out of Your Organization's Technical Debt: Executive Summary

This is an executive summary of the “Digging Out of Your Organization's Technical Debt” webinar that took place 08/14/2024. The speakers were Roselle Safran, Cybersecurity Expert and Entrepreneur, and Jill Cagliostro, Director 1, Product Management. The webinar was moderated by Becky Bracken, editor at Dark Reading.
DataBee
Harnessing the Power of Automation to Boost Enterprise Cybersecurity

Harnessing the Power of Automation to Boost Enterprise Cybersecurity

Thursday, October 3, 2024 at 1pm ET

Harnessing the Power of Automation to Boost Enterprise Cybersecurity

Thursday, October 3, 2024 at 1pm ET
Automox
State of AI in Cybersecurity: Beyond the Hype

State of AI in Cybersecurity: Beyond the Hype

| Live Virtual Event | Wednesday, October 30, 2024 | 11:00am ET | Doors Open at 10:30am ET

State of AI in Cybersecurity: Beyond the Hype

| Live Virtual Event | Wednesday, October 30, 2024 | 11:00am ET | Doors Open at 10:30am ET
Dark Reading and InformationWeek
Threat Hunting: Tools and Techniques to Stay a Step Ahead of Cybercriminals

Threat Hunting: Tools and Techniques to Stay a Step Ahead of Cybercriminals

Wednesday, September 25, 2024 at 1 PM EST

Threat Hunting: Tools and Techniques to Stay a Step Ahead of Cybercriminals

Wednesday, September 25, 2024 at 1 PM EST
Sophos
Digital Doppelg�ngers: The Dual Faces of Deepfake Technology

Digital Doppelg�ngers: The Dual Faces of Deepfake Technology

On-Demand

Digital Doppelg�ngers: The Dual Faces of Deepfake Technology

On-Demand
Knowbe4
How to Evaluate Hybrid-Cloud Network Policies and Enhance Security

How to Evaluate Hybrid-Cloud Network Policies and Enhance Security

Wednesday, September 18, 2024 at 1 PM EDT

How to Evaluate Hybrid-Cloud Network Policies and Enhance Security

Wednesday, September 18, 2024 at 1 PM EDT
Tufin
Making Orchestration Work for Your Enterprise

Making Orchestration Work for Your Enterprise

Thursday, September 19, 2024 at 1 PM EDT

Making Orchestration Work for Your Enterprise

Thursday, September 19, 2024 at 1 PM EDT
Delinea
5 Essential Insights into Generative AI for Security Leaders

5 Essential Insights into Generative AI for Security Leaders

Generative AI in Security: What you need to know.

5 Essential Insights into Generative AI for Security Leaders

Generative AI in Security: What you need to know.
SentinelOne
Building a Ransomware Response Playbook for Network Resilience

Building a Ransomware Response Playbook for Network Resilience

Thursday, September 12, 2024 at 1 PM EDT

Building a Ransomware Response Playbook for Network Resilience

Thursday, September 12, 2024 at 1 PM EDT
Darktrace
Generative AI Gifts

Generative AI Gifts

Three ways Generative AI can evolve security.

Generative AI Gifts

Three ways Generative AI can evolve security.
SentinelOne
Purple AI Datasheet

Purple AI Datasheet

Purple AI -- your always-on AI security analyst.

Purple AI Datasheet

Purple AI -- your always-on AI security analyst.
SentinelOne
SANS 2024 Security Awareness Report�️

SANS 2024 Security Awareness Report�️

Embedding a Strong Security Culture

SANS 2024 Security Awareness Report�️

Embedding a Strong Security Culture
SANS Institute
SANS Security Awareness Maturity Model�️

SANS Security Awareness Maturity Model�️

Your Roadmap to Managing Human Risk

SANS Security Awareness Maturity Model�️

Your Roadmap to Managing Human Risk
SANS Institute
SecOps Checklist

SecOps Checklist

Prepare your business for the age of AI.

SecOps Checklist

Prepare your business for the age of AI.
SentinelOne
Catch the Threat Before it Catches you: Proactive Ransomware Defense

Catch the Threat Before it Catches you: Proactive Ransomware Defense

Thursday, September 5, 2024 at 1PM EST

Catch the Threat Before it Catches you: Proactive Ransomware Defense

Thursday, September 5, 2024 at 1PM EST
Infoblox
How to Empower IT with Immutable Data Vaults

How to Empower IT with Immutable Data Vaults

On-Demand Webinar

How to Empower IT with Immutable Data Vaults

On-Demand Webinar
Rubrik
How to Use Threat Intelligence to Mitigate Third-Party Risk

How to Use Threat Intelligence to Mitigate Third-Party Risk

This is an executive summary of the “How to Use Threat Intelligence to Mitigate Third-Party Risk” webinar that took place July 10th, 2024. The speakers were Dr. Jason W. Clark, Independent Security Researcher, and Ankit Sharma, Senior Director at Cyble. The webinar was moderated by Terry Sweeney, contributing editor at Dark Reading.

How to Use Threat Intelligence to Mitigate Third-Party Risk

This is an executive summary of the “How to Use Threat Intelligence to Mitigate Third-Party Risk” webinar that took place July 10th, 2024. The speakers were Dr. Jason W. Clark, Independent Security Researcher, and Ankit Sharma, Senior Director at Cyble. The webinar was moderated by Terry Sweeney, contributing editor at Dark Reading.
Cyble
Managing Third-Party Risk Through Situational Awareness

Managing Third-Party Risk Through Situational Awareness

Third-party risks are rising due to a number of factors, including a growing number of business partnerships, as well as the increasing use of cloud infrastructure and services and externally developed software. With every new third party and partner, an organizaiton's attack surface grows. Surveys highlight that, when it comes to managing third-party cybersecurity risk, not enough is being done. See how enterprises can use threat intelligence to manage risks effectively.

Managing Third-Party Risk Through Situational Awareness

Third-party risks are rising due to a number of factors, including a growing number of business partnerships, as well as the increasing use of cloud infrastructure and services and externally developed software. With every new third party and partner, an organizaiton's attack surface grows. Surveys highlight that, when it comes to managing third-party cybersecurity risk, not enough is being done. See how enterprises can use threat intelligence to manage risks effectively.
Cyble
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.