Cybersecurity Resource Library

The #1 source for free Cybersecurity reports, whitepapers, webinars, research and more.

Showing results 1 - 30 of 53
Showing results 1 - 30 of 53

Filter by

Filters

How Enterprises Secure Their Applications

How Enterprises Secure Their Applications

Organizations are boldly embracing AppSec practices and focusing on their software security posture, but age-old problems of insufficient funding and security resources remain major roadblocks. Learn more in this in-depth research report.

How Enterprises Secure Their Applications

Organizations are boldly embracing AppSec practices and focusing on their software security posture, but age-old problems of insufficient funding and security resources remain major roadblocks. Learn more in this in-depth research report.
OpenText
How Supply Chain Attacks Work -- and How to Secure Against Them

How Supply Chain Attacks Work -- and How to Secure Against Them

Software supply chains are increasingly facing attacks that are notoriously challenging to identify and protect against. Here’s what security teams need to know.

How Supply Chain Attacks Work -- and How to Secure Against Them

Software supply chains are increasingly facing attacks that are notoriously challenging to identify and protect against. Here’s what security teams need to know.
JFrog Inc
Making Sense of Your Security Data: The 6 Hardest Problems

Making Sense of Your Security Data: The 6 Hardest Problems

Maximizing security operations data takes not only an understanding of data sources and what they mean for risk, but also careful data management and cost awareness. Security data is typically siloed and it's also extremely diverse and varying in quality. Security operations personnel have to perform deep analysis and thoroughly understand data's context to use it effectively. The data integration and analysis issues that crop up from data silos demand a lot of strategic and tactical planning.

Making Sense of Your Security Data: The 6 Hardest Problems

Maximizing security operations data takes not only an understanding of data sources and what they mean for risk, but also careful data management and cost awareness. Security data is typically siloed and it's also extremely diverse and varying in quality. Security operations personnel have to perform deep analysis and thoroughly understand data's context to use it effectively. The data integration and analysis issues that crop up from data silos demand a lot of strategic and tactical planning.
Google Cloud
The State of Incident Response

The State of Incident Response

IT and cybersecurity teams are confident about their incident response practices as they evolve into a collaborative effort integrating cross-functional teams and external partners. Learn more about

The State of Incident Response

IT and cybersecurity teams are confident about their incident response practices as they evolve into a collaborative effort integrating cross-functional teams and external partners. Learn more about
Fortinet
How Enterprise Are Responding to the Incident Response Challenge

How Enterprise Are Responding to the Incident Response Challenge

Many organizations bolstered their incident response capabilities last year to address a wide and growing range of security threats to their IT environments. The efforts drove an increase in the number of organizations that have an established security operations center, dedicated security staff, and full-fledged incident response teams. Many have established security operations centers and have a dedicated incident response team to address a continuing increase in reported security incidents.

How Enterprise Are Responding to the Incident Response Challenge

Many organizations bolstered their incident response capabilities last year to address a wide and growing range of security threats to their IT environments. The efforts drove an increase in the number of organizations that have an established security operations center, dedicated security staff, and full-fledged incident response teams. Many have established security operations centers and have a dedicated incident response team to address a continuing increase in reported security incidents.
Dark Reading
How Enterprises Assess Their Cyber-Risk

How Enterprises Assess Their Cyber-Risk

Organizations have deployed an array of controls for managing cyber-risks as they deal with a complex landscape of threats.  While cloud and remote workforce issues dominate the  agenda, these are just two of the ever-increasing number of  cyber-risks at modern enterprise organizations

How Enterprises Assess Their Cyber-Risk

Organizations have deployed an array of controls for managing cyber-risks as they deal with a complex landscape of threats.  While cloud and remote workforce issues dominate the  agenda, these are just two of the ever-increasing number of  cyber-risks at modern enterprise organizations
Orca
Industrial Networks in the Age of Digitalization

Industrial Networks in the Age of Digitalization

Now more than ever, increasingly connected operational technology (OT) networks face real cyber threats -- and a generation of new industrial control system (ICS)/OT security products and services aims to fill the security gaps.

Industrial Networks in the Age of Digitalization

Now more than ever, increasingly connected operational technology (OT) networks face real cyber threats -- and a generation of new industrial control system (ICS)/OT security products and services aims to fill the security gaps.
Dark Reading
Zero-Trust Adoption Driven by Data Protection, Cloud Access Control, and Regulatory Compliance Requirements

Zero-Trust Adoption Driven by Data Protection, Cloud Access Control, and Regulatory Compliance Requirements

Zero-trust initiatives are a key focus for many companies. Nearly 30% of organizations are already rolling out zero-trust initiatives to control access to their data and assets and more than 80% will have the capability within the next 18 months. Organizations are addressing cybersecurity challenges by enhancing identity and access management, privileged-access management, and data classification. They expect to see budgets for zero-trust initiatives grow modestly over the next 12 months.

Zero-Trust Adoption Driven by Data Protection, Cloud Access Control, and Regulatory Compliance Requirements

Zero-trust initiatives are a key focus for many companies. Nearly 30% of organizations are already rolling out zero-trust initiatives to control access to their data and assets and more than 80% will have the capability within the next 18 months. Organizations are addressing cybersecurity challenges by enhancing identity and access management, privileged-access management, and data classification. They expect to see budgets for zero-trust initiatives grow modestly over the next 12 months.
Dark Reading
The Keys to Successfully Securing Cloud-Native Environments

The Keys to Successfully Securing Cloud-Native Environments

As the use of cloud computing rises, so does the complexity of these environments and the volume of attacks targeting cloud systems. As the ability to spin up infrastructure becomes more decentralized, a new generation of vulnerabilities and risks are created in misdelivery, misconfiguration, and publishing errors. This is the world enterprise security teams find themselves as they work to secure their cloud systems. Here is how to secure cloud-native systems and development pipelines.

The Keys to Successfully Securing Cloud-Native Environments

As the use of cloud computing rises, so does the complexity of these environments and the volume of attacks targeting cloud systems. As the ability to spin up infrastructure becomes more decentralized, a new generation of vulnerabilities and risks are created in misdelivery, misconfiguration, and publishing errors. This is the world enterprise security teams find themselves as they work to secure their cloud systems. Here is how to secure cloud-native systems and development pipelines.
Palo Alto Networks
The State of Generative AI in the Enterprise

The State of Generative AI in the Enterprise

With the sudden increase in organizations embracing generative AI tools, cybersecurity professionals are employing multiple strategies to mitigate risks to privacy, security, and regulatory compliance issues.

The State of Generative AI in the Enterprise

With the sudden increase in organizations embracing generative AI tools, cybersecurity professionals are employing multiple strategies to mitigate risks to privacy, security, and regulatory compliance issues.
Blink Ops
The State of Vulnerability

The State of Vulnerability

While many organizations today run either formal or informal vulnerability management programs, they struggle to patch and mitigate most discovered bugs due to budget and staffing constraints.

The State of Vulnerability

While many organizations today run either formal or informal vulnerability management programs, they struggle to patch and mitigate most discovered bugs due to budget and staffing constraints.
JFrog
Using Threat Intelligence to Transform Security Programs

Using Threat Intelligence to Transform Security Programs

Building a modern and effective cybersecurity team today means efficiently sharing cybersecurity intelligence. Cyber threat intelligence helps organizations maximize their digital defenses, respond better when attacks do occur, and even inform how to improve the overall security program. In years past, the challenge was finding threat intelligence. Now, it is finding useful signals in the data. Here’s how to get started.

Using Threat Intelligence to Transform Security Programs

Building a modern and effective cybersecurity team today means efficiently sharing cybersecurity intelligence. Cyber threat intelligence helps organizations maximize their digital defenses, respond better when attacks do occur, and even inform how to improve the overall security program. In years past, the challenge was finding threat intelligence. Now, it is finding useful signals in the data. Here’s how to get started.
Google Cloud
Key Elements Enterprises Need to Include in Modern SecOps

Key Elements Enterprises Need to Include in Modern SecOps

Security teams are overhwlemed in the operations center. As the enterprise's first line of defense against an active attack, the security operatoins center sifts through theat intelligence, events data, logs, and activity reports from throughout the enterprise and key partners. How can CISOs give the SOC the necessary tools to effectively manage the systems and data? What will it take to unlock effective threat detection and master data collection and response for modern defense?

Key Elements Enterprises Need to Include in Modern SecOps

Security teams are overhwlemed in the operations center. As the enterprise's first line of defense against an active attack, the security operatoins center sifts through theat intelligence, events data, logs, and activity reports from throughout the enterprise and key partners. How can CISOs give the SOC the necessary tools to effectively manage the systems and data? What will it take to unlock effective threat detection and master data collection and response for modern defense?
Google Cloud
Effective Security Analytics for Enterprises

Effective Security Analytics for Enterprises

Security data analytics can be used in ways beyond improving threat detection and incident response. An efficient SecOps data analytics program can help security operations teams scale their efforts, continuously improve their capabilities, and understand how to allocate their limited resources most effectively. Creating or setting up a SecOps data analytics program isn't easy, but with a proper foundation in place, enterprises can move from security guesswork to data-driven security decisions.

Effective Security Analytics for Enterprises

Security data analytics can be used in ways beyond improving threat detection and incident response. An efficient SecOps data analytics program can help security operations teams scale their efforts, continuously improve their capabilities, and understand how to allocate their limited resources most effectively. Creating or setting up a SecOps data analytics program isn't easy, but with a proper foundation in place, enterprises can move from security guesswork to data-driven security decisions.
Radiant Logic
Key DevSecOps Principles for Enterprise Mobile App Development

Key DevSecOps Principles for Enterprise Mobile App Development

DevSecOps principles can empower enterprises to speed up software release cycles in response to business needs while baking security into the entire development lifecycle. When done right, DevSecOps drastically improves application security practices without adding too much friction into the software engineering pipeline. Similarly, secure DevOps can help meet mobile development's unique application security challenges without adding too much friction to release cycles.

Key DevSecOps Principles for Enterprise Mobile App Development

DevSecOps principles can empower enterprises to speed up software release cycles in response to business needs while baking security into the entire development lifecycle. When done right, DevSecOps drastically improves application security practices without adding too much friction into the software engineering pipeline. Similarly, secure DevOps can help meet mobile development's unique application security challenges without adding too much friction to release cycles.
Security Innovation
Tips for a Streamlined Transition to Zero Trust

Tips for a Streamlined Transition to Zero Trust

Enterprises are embracing conditional access to fight off the volume and sophistication of today’s threats. This is the heart of zero trust, which is all about eradicating implicit trust from access-control systems. In the zero-trust model, everything is continuously verified, and authorization is adapted based on changing risk conditions. Experts recommend strategies for effectively managing the multistage, multiyear process of adopting a zero-trust architecture.

Tips for a Streamlined Transition to Zero Trust

Enterprises are embracing conditional access to fight off the volume and sophistication of today’s threats. This is the heart of zero trust, which is all about eradicating implicit trust from access-control systems. In the zero-trust model, everything is continuously verified, and authorization is adapted based on changing risk conditions. Experts recommend strategies for effectively managing the multistage, multiyear process of adopting a zero-trust architecture.
SonicWall
Passwords Are Passé: Next Gen Authentication Addresses Today's Threats

Passwords Are Passé: Next Gen Authentication Addresses Today's Threats

Passwordless is topic du jour in cybersecurity, and security teams are trying to make sense out of the plethora of technology options and identity layers available. Here's how to adopt a next-generation authentication architecture.

Passwords Are Passé: Next Gen Authentication Addresses Today's Threats

Passwordless is topic du jour in cybersecurity, and security teams are trying to make sense out of the plethora of technology options and identity layers available. Here's how to adopt a next-generation authentication architecture.
Nord
How to Deploy Zero Trust for Remote Workforce Security

How to Deploy Zero Trust for Remote Workforce Security

As the number of workers who want to work remotely rise, more organizations are turning to zero trust to secure and monitor these remote workers. Many of the essential elements of a remote security policy are also aspects of a zero-trust strategy, such as strong passwords, implementing two-factor authentication, and limiting access to sensitive data to only those who need it. Here's what a zero trust approach looks like for the remote workforce.

How to Deploy Zero Trust for Remote Workforce Security

As the number of workers who want to work remotely rise, more organizations are turning to zero trust to secure and monitor these remote workers. Many of the essential elements of a remote security policy are also aspects of a zero-trust strategy, such as strong passwords, implementing two-factor authentication, and limiting access to sensitive data to only those who need it. Here's what a zero trust approach looks like for the remote workforce.
Fortinet
The State of Supply Chain Threats

The State of Supply Chain Threats

Widely exploited vulnerabilities in open source software and malicious components being loaded in trusted public repositories have highlighted issues in the software supply chain. Here’s what organizations are doing to mitigate their risk.

The State of Supply Chain Threats

Widely exploited vulnerabilities in open source software and malicious components being loaded in trusted public repositories have highlighted issues in the software supply chain. Here’s what organizations are doing to mitigate their risk.
Mend
What Ransomware Groups Look for in Enterprise Victims

What Ransomware Groups Look for in Enterprise Victims

It is easy to fall into the trap of thinking your organization is too small, or too uninteresting, to be targeted by ransomware. But as attacks against educational institutions, fast-food franchises, shipping companies, retailers, and healthcare organizations have shown, ransomware gangs are casting a wide net for their victims. Learn how attackers identify who to target and things they look for in victim networks when putting together their attack campaigns.

What Ransomware Groups Look for in Enterprise Victims

It is easy to fall into the trap of thinking your organization is too small, or too uninteresting, to be targeted by ransomware. But as attacks against educational institutions, fast-food franchises, shipping companies, retailers, and healthcare organizations have shown, ransomware gangs are casting a wide net for their victims. Learn how attackers identify who to target and things they look for in victim networks when putting together their attack campaigns.
Mandiant
Where and When Automation Makes Sense for Enterprise Security

Where and When Automation Makes Sense for Enterprise Security

A shortage of skilled IT security professionals has made it tempting to try to automate everything, but not everything can be safely automated. Learn how emerging automation technologies work and how security teams can implement them in a way that is both secure and effective.

Where and When Automation Makes Sense for Enterprise Security

A shortage of skilled IT security professionals has made it tempting to try to automate everything, but not everything can be safely automated. Learn how emerging automation technologies work and how security teams can implement them in a way that is both secure and effective.
Hyperproof
The Secrets of Successful SecOps Data Analytics

The Secrets of Successful SecOps Data Analytics

If there’s something all security operations teams need, but few get right, it is utilizing security data analytics. An effective SecOps data analytics program enables SecOps teams to continuously monitor their environments for signs of compromise and stop potential attacks before they can cause serious damage. Also, good data makes effective collaboration between SecOps and IT possible. Here's how to make sense out of too much data and too many data sources for better enterprise security.

The Secrets of Successful SecOps Data Analytics

If there’s something all security operations teams need, but few get right, it is utilizing security data analytics. An effective SecOps data analytics program enables SecOps teams to continuously monitor their environments for signs of compromise and stop potential attacks before they can cause serious damage. Also, good data makes effective collaboration between SecOps and IT possible. Here's how to make sense out of too much data and too many data sources for better enterprise security.
Infoblox
Creating an Effective Incident Response Plan

Creating an Effective Incident Response Plan

Security teams are realizing their organizations will experience a cyber incident and that they need an effective incident response plan -- one that takes into account their requirements and has been tested.

Creating an Effective Incident Response Plan

Security teams are realizing their organizations will experience a cyber incident and that they need an effective incident response plan -- one that takes into account their requirements and has been tested.
Google Cloud
How to Use Threat Intelligence to Mitigate  Third-Party Risk

How to Use Threat Intelligence to Mitigate Third-Party Risk

Today, enterprises are only as secure as their weakest links -- and those links often prove to be third-party providers. Threat intelligence can help strengthen third-party links and risks.

How to Use Threat Intelligence to Mitigate Third-Party Risk

Today, enterprises are only as secure as their weakest links -- and those links often prove to be third-party providers. Threat intelligence can help strengthen third-party links and risks.
Google Cloud
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks

Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks

Many organizations assumed remote work would fade as organizations lift COVID-19 pandemic restrictions and things would return to “normal.” Not only is remote work here to stay, security teams are tasked with managing and securing a complex data environment.

Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks

Many organizations assumed remote work would fade as organizations lift COVID-19 pandemic restrictions and things would return to “normal.” Not only is remote work here to stay, security teams are tasked with managing and securing a complex data environment.
Fortinet
Dark Reading Research: Concerns Mount Over Ransomware, Zero-Day Bugs, and AI-Enabled Malware

Dark Reading Research: Concerns Mount Over Ransomware, Zero-Day Bugs, and AI-Enabled Malware

Enterprise security defenders are more concerned than they were a year ago about zero-day bugs, AI-enabled threats, and cloud malware. But they continue to perceive ransomware as their biggest security challenge.

Dark Reading Research: Concerns Mount Over Ransomware, Zero-Day Bugs, and AI-Enabled Malware

Enterprise security defenders are more concerned than they were a year ago about zero-day bugs, AI-enabled threats, and cloud malware. But they continue to perceive ransomware as their biggest security challenge.
Fortinet
Everything You Need to Know About DNS Attacks

Everything You Need to Know About DNS Attacks

It’s important to understand DNS, potential attacks against it, and the tools and techniques required to defend DNS infrastructure. This report answers all the questions you were afraid to ask.

Everything You Need to Know About DNS Attacks

It’s important to understand DNS, potential attacks against it, and the tools and techniques required to defend DNS infrastructure. This report answers all the questions you were afraid to ask.
Infoblox
How Supply Chain Attacks Work, and How to Stop Them

How Supply Chain Attacks Work, and How to Stop Them

Security leaders are scrambling to assess the security of their supply chains. Here are some ways to protect applications and third-party partnerships from attack.

How Supply Chain Attacks Work, and How to Stop Them

Security leaders are scrambling to assess the security of their supply chains. Here are some ways to protect applications and third-party partnerships from attack.
Mend
How Enterprises Are Managing Application Security Risks in a Heightened Threat Environment

How Enterprises Are Managing Application Security Risks in a Heightened Threat Environment

Concerns over API security and low-code/no-code use added to an already-full plate of application security challenges for many organizations over the last year.

How Enterprises Are Managing Application Security Risks in a Heightened Threat Environment

Concerns over API security and low-code/no-code use added to an already-full plate of application security challenges for many organizations over the last year.
Invicti
The Promise and Reality of Cloud Security

The Promise and Reality of Cloud Security

The head-spinning rush to the cloud in the wake of the COVID-19 pandemic laid bare a new category of security risks that has forced both enterprises and cloud providers to adapt their security practices. See how cloud security is rapidly evolving.

The Promise and Reality of Cloud Security

The head-spinning rush to the cloud in the wake of the COVID-19 pandemic laid bare a new category of security risks that has forced both enterprises and cloud providers to adapt their security practices. See how cloud security is rapidly evolving.
Wiz
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.