Cybersecurity Resource Library

The #1 source for free Cybersecurity reports, whitepapers, webinars, research and more.

Showing results 211 - 240 of 1023
Showing results 211 - 240 of 1023

Filter by

Filters

LevelBlue Futures™ 2024 Report: Cyber Resilience

LevelBlue Futures™ 2024 Report: Cyber Resilience

Unveil Tomorrow's Security Today! Dive into the 2024 LevelBlue Futures™ Report: Cyber Resilience. Discover the secrets to strengthening your digital fortress against evolving threats. Don't just survive, thrive in the cyber age. Get your exclusive copy now!

LevelBlue Futures™ 2024 Report: Cyber Resilience

Unveil Tomorrow's Security Today! Dive into the 2024 LevelBlue Futures™ Report: Cyber Resilience. Discover the secrets to strengthening your digital fortress against evolving threats. Don't just survive, thrive in the cyber age. Get your exclusive copy now!
LevelBlue
Google Cloud Security Foundations for Dummies

Google Cloud Security Foundations for Dummies

The complete guide to protect everything you build and run on Google Cloud

Google Cloud Security Foundations for Dummies

The complete guide to protect everything you build and run on Google Cloud
Wiz
The Ultimate Guide for Evaluating Cloud Security Solutions

The Ultimate Guide for Evaluating Cloud Security Solutions

Everything you need to know when evaluating cloud security solutions

The Ultimate Guide for Evaluating Cloud Security Solutions

Everything you need to know when evaluating cloud security solutions
Wiz
A Year in Review of Zero-Days Exploited In-the-Wild in 2023

A Year in Review of Zero-Days Exploited In-the-Wild in 2023

Google observed 97 zero-day vulnerabilities exploited in-the-wild in 2023, over 50 percent more than 2022 (62 vulnerabilities). This report shares the combined analysis of Google’s Threat Analysis Group (TAG) and Mandiant and includes: trends, gaps, lessons learned, and successes across the year as a whole.

A Year in Review of Zero-Days Exploited In-the-Wild in 2023

Google observed 97 zero-day vulnerabilities exploited in-the-wild in 2023, over 50 percent more than 2022 (62 vulnerabilities). This report shares the combined analysis of Google’s Threat Analysis Group (TAG) and Mandiant and includes: trends, gaps, lessons learned, and successes across the year as a whole.
Google Cloud Security
Google Cloud Threat Horizons Report, H1 2024

Google Cloud Threat Horizons Report, H1 2024

Get insights and recommendations from cybersecurity experts in the latest edition of our Google Cloud Threat Horizons Report. Learn how you can defend your organization against emerging threats and stay ahead of threat actors’ evolving tactics.

Google Cloud Threat Horizons Report, H1 2024

Get insights and recommendations from cybersecurity experts in the latest edition of our Google Cloud Threat Horizons Report. Learn how you can defend your organization against emerging threats and stay ahead of threat actors’ evolving tactics.
Google Cloud Security
Google Threat Intelligence

Google Threat Intelligence

Google Threat Intelligence has unmatched visibility into threats enabling us to deliver detailed and timely threat intelligence to security teams around the world. With a diverse set of intelligence sources, Google is able to provide unmatched breadth and depth to this visibility.

Google Threat Intelligence

Google Threat Intelligence has unmatched visibility into threats enabling us to deliver detailed and timely threat intelligence to security teams around the world. With a diverse set of intelligence sources, Google is able to provide unmatched breadth and depth to this visibility.
Google Cloud Security
How Cyber Threat Intelligence Empowers the C-Suite

How Cyber Threat Intelligence Empowers the C-Suite

Learn how cyber threat intelligence teams who understand the relevance of risk management practices can influence C-suite executives and board members more effectively.

How Cyber Threat Intelligence Empowers the C-Suite

Learn how cyber threat intelligence teams who understand the relevance of risk management practices can influence C-suite executives and board members more effectively.
Google Cloud Security
The Forrester Wave�: External Threat Intelligence Service Providers, Q3 2023

The Forrester Wave�: External Threat Intelligence Service Providers, Q3 2023

Google was named a Leader in The Forrester Wave™: External Threat Intelligence Service Providers, Q3 2023. Forrester identified 12 top companies in the threat intelligence space and Google received the highest possible score in 15 out of the 29 criteria.

The Forrester Wave�: External Threat Intelligence Service Providers, Q3 2023

Google was named a Leader in The Forrester Wave™: External Threat Intelligence Service Providers, Q3 2023. Forrester identified 12 top companies in the threat intelligence space and Google received the highest possible score in 15 out of the 29 criteria.
Google Cloud Security
2024 Penetration Testing Report

2024 Penetration Testing Report

Offensive cybersecurity practices like pen testing stand apart from other security methods. By learning how other organizations are utilizing penetration testing, we gain valuable perspectives on the efficacy of different approaches, challenges encountered, and lessons learned. Read the report to understand the current state of pen testing practices, providing ongoing, useful data on the following key issues related to pen testing.

2024 Penetration Testing Report

Offensive cybersecurity practices like pen testing stand apart from other security methods. By learning how other organizations are utilizing penetration testing, we gain valuable perspectives on the efficacy of different approaches, challenges encountered, and lessons learned. Read the report to understand the current state of pen testing practices, providing ongoing, useful data on the following key issues related to pen testing.
Fortra
A Simple Guide to Successful Red Teaming

A Simple Guide to Successful Red Teaming

Red Teaming simulates malicious activities of a long-term adversary embedded in a network to test an organization’s ability to detect and respond to intrusions. Read the guide to learn about benefits of red teaming, use cases, and how to maximize your red team engagement

A Simple Guide to Successful Red Teaming

Red Teaming simulates malicious activities of a long-term adversary embedded in a network to test an organization’s ability to detect and respond to intrusions. Read the guide to learn about benefits of red teaming, use cases, and how to maximize your red team engagement
Fortra
Managing your Attack Surface

Managing your Attack Surface

Every point in your organization that provides access to data is what’s known as your attack surface. Your attack surface includes both digital and physical endpoints. It’s vital to understand what it is and how to protect it. Read this guide to understand the breadth of the attack surface and how organizations can effectively manage it to reduce risk.

Managing your Attack Surface

Every point in your organization that provides access to data is what’s known as your attack surface. Your attack surface includes both digital and physical endpoints. It’s vital to understand what it is and how to protect it. Read this guide to understand the breadth of the attack surface and how organizations can effectively manage it to reduce risk.
Fortra
The Complete Guide to Layering Offensive Security

The Complete Guide to Layering Offensive Security

Offensive security is when organization takes steps to actively anticipate and prevent cyberattacks instead of only reacting once an attack has occurred. The best offensive security takes a layered approach to identify vulnerabilities and exposures. Read the guide to understand how your organization can layer offensive security tactics into a holistic security strategy.

The Complete Guide to Layering Offensive Security

Offensive security is when organization takes steps to actively anticipate and prevent cyberattacks instead of only reacting once an attack has occurred. The best offensive security takes a layered approach to identify vulnerabilities and exposures. Read the guide to understand how your organization can layer offensive security tactics into a holistic security strategy.
Fortra
2024 Global Cyber Confidence Index

2024 Global Cyber Confidence Index

How confident are you in your organization’s ability to manage cyber risk?

2024 Global Cyber Confidence Index

How confident are you in your organization’s ability to manage cyber risk?
ExtraHop
Are You Ready for Ransomware?

Are You Ready for Ransomware?

Ransomware attacks are on the rise. Are you ready?

Are You Ready for Ransomware?

Ransomware attacks are on the rise. Are you ready?
ExtraHop
BAS as the Keystone of Security Validation in Multi-Layered Defense

BAS as the Keystone of Security Validation in Multi-Layered Defense

Discover how Breach and Attack Simulation (BAS) is pivotal in continuously validating security across every layer of defense, essential for adapting to the dynamic cyber threat environment.

BAS as the Keystone of Security Validation in Multi-Layered Defense

Discover how Breach and Attack Simulation (BAS) is pivotal in continuously validating security across every layer of defense, essential for adapting to the dynamic cyber threat environment.
Picus
Double Your Threat Blocking in 90 Days

Double Your Threat Blocking in 90 Days

Learn how Breach and Attack Simulation optimizes your prevention and detection controls - enabling you to block twice as many threats in just your first 90 days.

Double Your Threat Blocking in 90 Days

Learn how Breach and Attack Simulation optimizes your prevention and detection controls - enabling you to block twice as many threats in just your first 90 days.
Picus
Ridge Security's AI-Driven Security Validation Gives Unparalleled Power to Cyber Defenders

Ridge Security's AI-Driven Security Validation Gives Unparalleled Power to Cyber Defenders

As organizations face evolving threats, integrating AI into cybersecurity brings an intelligent, iterative, and continuous learning force with unparalleled opportunities to enhance defense mechanisms, streamline processes, and mitigate risks more effectively.

Ridge Security's AI-Driven Security Validation Gives Unparalleled Power to Cyber Defenders

As organizations face evolving threats, integrating AI into cybersecurity brings an intelligent, iterative, and continuous learning force with unparalleled opportunities to enhance defense mechanisms, streamline processes, and mitigate risks more effectively.
Ridge Security
Security Validation Testing: Comparing Breach and Attack Simulation with Traditional Methods

Security Validation Testing: Comparing Breach and Attack Simulation with Traditional Methods

Explore the advantages of Breach and Attack Simulation (BAS) over red teaming, vulnerability management, and automated penetration testing as the superior choice for security validation and cyber threat exposure management (CTEM).

Security Validation Testing: Comparing Breach and Attack Simulation with Traditional Methods

Explore the advantages of Breach and Attack Simulation (BAS) over red teaming, vulnerability management, and automated penetration testing as the superior choice for security validation and cyber threat exposure management (CTEM).
Picus
The Dangers of Cyber Risk Quantification

The Dangers of Cyber Risk Quantification

Reporting on cyber risk can get risky. Three current and former CISOs share their experiences.

The Dangers of Cyber Risk Quantification

Reporting on cyber risk can get risky. Three current and former CISOs share their experiences.
ExtraHop
The How to Survive the Ransomware Rampage

The How to Survive the Ransomware Rampage

Several trends are fueling the rapid rise in both frequency and size of cyberattacks. Threat actors are also adjusting their playbook for higher-impact targets to gain larger and more assured payouts. Harden your assets against Ransomware today.

The How to Survive the Ransomware Rampage

Several trends are fueling the rapid rise in both frequency and size of cyberattacks. Threat actors are also adjusting their playbook for higher-impact targets to gain larger and more assured payouts. Harden your assets against Ransomware today.
Ridge Security
The State of Threat Exposure Management

The State of Threat Exposure Management

Learn about the four 'impossible' tradeoffs security teams are making and how to navigate these with Continuous Threat Exposure Management.

The State of Threat Exposure Management

Learn about the four 'impossible' tradeoffs security teams are making and how to navigate these with Continuous Threat Exposure Management.
Picus
The True Cost of a Security Breach

The True Cost of a Security Breach

Can your organization afford a data breach?

The True Cost of a Security Breach

Can your organization afford a data breach?
ExtraHop
Unlock External Exposure Management with Ridge Security

Unlock External Exposure Management with Ridge Security

Managed Security Service Providers (MSSP) and Managed Detection and Response (MDR) providers are building out adjacent service capabilities to help customers manage this increasingly complex and distributed landscape. Ridge Security’s MSSP program is designed to help you achieve these business benefits with award-winning tools, targeted exposure management capabilities and easy API integration.

Unlock External Exposure Management with Ridge Security

Managed Security Service Providers (MSSP) and Managed Detection and Response (MDR) providers are building out adjacent service capabilities to help customers manage this increasingly complex and distributed landscape. Ridge Security’s MSSP program is designed to help you achieve these business benefits with award-winning tools, targeted exposure management capabilities and easy API integration.
Ridge Security
Effective Asset Management Is Critical to Enterprise Cybersecurity

Effective Asset Management Is Critical to Enterprise Cybersecurity

An enterprise cannot protect the business without knowing what devices and software it has -- on-premises, cloud, and spaces in between -- yet few organizations have effective asset management in place. Organizations need to take a holistic approach with automated discovery tools, robust data management processes, governance frameworks, and collaboration across teams. This report discusses how to set up asset management programs that help reduce risk and maintain a secure digital footprint.

Effective Asset Management Is Critical to Enterprise Cybersecurity

An enterprise cannot protect the business without knowing what devices and software it has -- on-premises, cloud, and spaces in between -- yet few organizations have effective asset management in place. Organizations need to take a holistic approach with automated discovery tools, robust data management processes, governance frameworks, and collaboration across teams. This report discusses how to set up asset management programs that help reduce risk and maintain a secure digital footprint.
Panaseer
How to Use Threat Intelligence to Mitigate Third Party Risk

How to Use Threat Intelligence to Mitigate Third Party Risk

Wednesday, July 10, 2024 at 1 PM EDT | Brought to you by Cyble

How to Use Threat Intelligence to Mitigate Third Party Risk

Wednesday, July 10, 2024 at 1 PM EDT | Brought to you by Cyble
Cyble
Ask Ada Gen AI/ML Powered Zero Trust CNAPP to Prevent Modern Day Attacks

Ask Ada Gen AI/ML Powered Zero Trust CNAPP to Prevent Modern Day Attacks

Explore how generative AI capabilities allow CNAPP platforms to deliver unified visibility, accelerated detection, and tailored recommendations across complex cloud infrastructure. Accelerate cloud-native security with Ask Ada: One of the first Gen AI/ML based cloud security assistant. Not just another Chatbot. Bridge visibility gaps, eliminate alert fatigue, and fix vulnerability triages. Ask Ada helps with interactive “Zero Trust” security.

Ask Ada Gen AI/ML Powered Zero Trust CNAPP to Prevent Modern Day Attacks

Explore how generative AI capabilities allow CNAPP platforms to deliver unified visibility, accelerated detection, and tailored recommendations across complex cloud infrastructure. Accelerate cloud-native security with Ask Ada: One of the first Gen AI/ML based cloud security assistant. Not just another Chatbot. Bridge visibility gaps, eliminate alert fatigue, and fix vulnerability triages. Ask Ada helps with interactive “Zero Trust” security.
AccuKnox
Become a Cloud Security Expert in Under 48 Hours: Learn how to find, prioritize, and remediate risks in the cloud without adding complexity

Become a Cloud Security Expert in Under 48 Hours: Learn how to find, prioritize, and remediate risks in the cloud without adding complexity

Monday, May 6, 2024 at 1pm ET

Become a Cloud Security Expert in Under 48 Hours: Learn how to find, prioritize, and remediate risks in the cloud without adding complexity

Monday, May 6, 2024 at 1pm ET
Tenable
Preventing Attackers From Wandering Through Your Enterprise Infrastructure

Preventing Attackers From Wandering Through Your Enterprise Infrastructure

Tuesday, June 18, 2024; at 1 PM EDT | Brought to you by Google Cloud Security

Preventing Attackers From Wandering Through Your Enterprise Infrastructure

Tuesday, June 18, 2024; at 1 PM EDT | Brought to you by Google Cloud Security
Google Cloud Security
Leveling Up Cyber-Threat Intelligence Maturity for More Value and Better Insights

Leveling Up Cyber-Threat Intelligence Maturity for More Value and Better Insights

Great cyber-threat intelligence isn't just indicators of compromise (IoCs) and tactics, techniques, and procedures (TTPs); an effective intelligence program delivers strategic, operational, and tactical insights tailored to stakeholders across the business. By analyzing patterns and trends in data from both inside and outside an organization, security teams gain the insight needed to bolster detection, refine the security technology stack, and chart a course for strategic risk management.

Leveling Up Cyber-Threat Intelligence Maturity for More Value and Better Insights

Great cyber-threat intelligence isn't just indicators of compromise (IoCs) and tactics, techniques, and procedures (TTPs); an effective intelligence program delivers strategic, operational, and tactical insights tailored to stakeholders across the business. By analyzing patterns and trends in data from both inside and outside an organization, security teams gain the insight needed to bolster detection, refine the security technology stack, and chart a course for strategic risk management.
Infoblox
AI Fitness v. Readiness: Is Your Security Program Ready to Tackle Generative AI Tools?

AI Fitness v. Readiness: Is Your Security Program Ready to Tackle Generative AI Tools?

Available On-Demand

AI Fitness v. Readiness: Is Your Security Program Ready to Tackle Generative AI Tools?

Available On-Demand
Snyk
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.