Cybersecurity Resource Library

The #1 source for free Cybersecurity reports, whitepapers, webinars, research and more.

Showing results 1 - 30 of 166
Showing results 1 - 30 of 166

Filter by

Filters

The Future of Passwords and the Passwordless Evolution

The Future of Passwords and the Passwordless Evolution

In this webinar, we explore the evolution of digital security. Discover how innovative technologies are paving the way for a world without passwords, enhancing both security and user experience. Learn from industry experts about the benefits, challenges, and practical steps to transition towards a passwordless future. Don't miss this opportunity to stay ahead in the ever-changing landscape of cybersecurity.

The Future of Passwords and the Passwordless Evolution

In this webinar, we explore the evolution of digital security. Discover how innovative technologies are paving the way for a world without passwords, enhancing both security and user experience. Learn from industry experts about the benefits, challenges, and practical steps to transition towards a passwordless future. Don't miss this opportunity to stay ahead in the ever-changing landscape of cybersecurity.
Delinea
How to Find and Fix Application Vulnerabilities...Fast

How to Find and Fix Application Vulnerabilities...Fast

Thursday, August 22, 2024 at 1:00pm EDT

How to Find and Fix Application Vulnerabilities...Fast

Thursday, August 22, 2024 at 1:00pm EDT
Mend
Your guide to the great SIEM migration

Your guide to the great SIEM migration

Wednesday, August 21 2024 at 1PM ET

Your guide to the great SIEM migration

Wednesday, August 21 2024 at 1PM ET
Google Cloud Security
Developing a Cyber Risk Assessment for the C-Suite

Developing a Cyber Risk Assessment for the C-Suite

Thursday, August 29, 2024 at 1 PM EDT

Developing a Cyber Risk Assessment for the C-Suite

Thursday, August 29, 2024 at 1 PM EDT
Qualys
CISO Perspectives: How to make AI an Accelerator, Not a Blocker

CISO Perspectives: How to make AI an Accelerator, Not a Blocker

Tuesday, August 20, 2024 at 1:00pm EDT

CISO Perspectives: How to make AI an Accelerator, Not a Blocker

Tuesday, August 20, 2024 at 1:00pm EDT
Tines
Securing Your Cloud Assets

Securing Your Cloud Assets

Tuesday, August 27, 2024 at 1:00pm EDT

Securing Your Cloud Assets

Tuesday, August 27, 2024 at 1:00pm EDT
Wiz
Digging Out Your Organization's Technical Debt

Digging Out Your Organization's Technical Debt

Wednesday, August 14, 2024; at 1 PM EDT | Brought to you by Comcast Technology Solutions

Digging Out Your Organization's Technical Debt

Wednesday, August 14, 2024; at 1 PM EDT | Brought to you by Comcast Technology Solutions
Comcast Technology Solutions
The Rise of AI-Powered Malware and Application Security Best Practices

The Rise of AI-Powered Malware and Application Security Best Practices

Tuesday, July 23, 2024 at 1PM EDT

The Rise of AI-Powered Malware and Application Security Best Practices

Tuesday, July 23, 2024 at 1PM EDT
Opswat
The Role of Identity Access Management in a Zero Trust Framework

The Role of Identity Access Management in a Zero Trust Framework

Wednesday, July 24, 2024 at 1pm EDT

The Role of Identity Access Management in a Zero Trust Framework

Wednesday, July 24, 2024 at 1pm EDT
Okta
Enhancing DNS Security: Implementing Encrypted DNS to Meet CISA Guidelines

Enhancing DNS Security: Implementing Encrypted DNS to Meet CISA Guidelines

Thursday, July 18, 2024 at 1:00pm EDT

Enhancing DNS Security: Implementing Encrypted DNS to Meet CISA Guidelines

Thursday, July 18, 2024 at 1:00pm EDT
Infoblox
Data Protection Essentials: Proactive PII Leak Prevention and Data Mapping for GDPR

Data Protection Essentials: Proactive PII Leak Prevention and Data Mapping for GDPR

Join the former CISO of UiPath, Okta, Splunk, and SoFi to learn proactive approaches for preventing PII leaks and automating data mapping for compliance. Remediating PII leaks in production is costly and disruptive, while GDPR compliance often relies on manual spreadsheets and surveys. This session covers controls to minimize PII leak risks and streamline data mapping for compliance, featuring a new AI-powered code scanner that stops PII leaks at the code level and automates the creation of RoPA

Data Protection Essentials: Proactive PII Leak Prevention and Data Mapping for GDPR

Join the former CISO of UiPath, Okta, Splunk, and SoFi to learn proactive approaches for preventing PII leaks and automating data mapping for compliance. Remediating PII leaks in production is costly and disruptive, while GDPR compliance often relies on manual spreadsheets and surveys. This session covers controls to minimize PII leak risks and streamline data mapping for compliance, featuring a new AI-powered code scanner that stops PII leaks at the code level and automates the creation of RoPA
HoundDog.ai
All the Ways the Internet is Surveilling You

All the Ways the Internet is Surveilling You

Thursday, July 25, 2024 at 1 PM EST

All the Ways the Internet is Surveilling You

Thursday, July 25, 2024 at 1 PM EST
Knowbe4
Next Generation Supply Chain Security

Next Generation Supply Chain Security

Thursday, July 11, 2024 at 1 PM EDT | Brought to you by Snyk

Next Generation Supply Chain Security

Thursday, July 11, 2024 at 1 PM EDT | Brought to you by Snyk
Snyk
Mind the Cyber Resilience Gap

Mind the Cyber Resilience Gap

View On-Demand

Mind the Cyber Resilience Gap

View On-Demand
Commvault
Protecting the Crown Jewels: Source Code Security

Protecting the Crown Jewels: Source Code Security

Tuesday, July 16, 2024 at 1 PM EDT | Brought to you by Mend.io

Protecting the Crown Jewels: Source Code Security

Tuesday, July 16, 2024 at 1 PM EDT | Brought to you by Mend.io
Mend.io
Empowering Developers, Automating Security: The Future of AppSec

Empowering Developers, Automating Security: The Future of AppSec

Thursday, June 27, 2024 at 1 PM EDT | Brought to you by Snyk

Empowering Developers, Automating Security: The Future of AppSec

Thursday, June 27, 2024 at 1 PM EDT | Brought to you by Snyk
Snyk
Cutting Through the AI Hype: Practical Strategies for Real-World Cybersecurity Success

Cutting Through the AI Hype: Practical Strategies for Real-World Cybersecurity Success

Wednesday, July 17, 2024; at 1 PM EDT | Brought to you by Sophos

Cutting Through the AI Hype: Practical Strategies for Real-World Cybersecurity Success

Wednesday, July 17, 2024; at 1 PM EDT | Brought to you by Sophos
Sophos Inc.
Gigamon CISO Series: Analyst Research on Supercharging Observability and AIOps with Network Telemetry

Gigamon CISO Series: Analyst Research on Supercharging Observability and AIOps with Network Telemetry

Available On-Demand

Gigamon CISO Series: Analyst Research on Supercharging Observability and AIOps with Network Telemetry

Available On-Demand
Gigamon
How to Use Threat Intelligence to Mitigate Third Party Risk

How to Use Threat Intelligence to Mitigate Third Party Risk

Wednesday, July 10, 2024 at 1 PM EDT | Brought to you by Cyble

How to Use Threat Intelligence to Mitigate Third Party Risk

Wednesday, July 10, 2024 at 1 PM EDT | Brought to you by Cyble
Cyble
Become a Cloud Security Expert in Under 48 Hours: Learn how to find, prioritize, and remediate risks in the cloud without adding complexity

Become a Cloud Security Expert in Under 48 Hours: Learn how to find, prioritize, and remediate risks in the cloud without adding complexity

Monday, May 6, 2024 at 1pm ET

Become a Cloud Security Expert in Under 48 Hours: Learn how to find, prioritize, and remediate risks in the cloud without adding complexity

Monday, May 6, 2024 at 1pm ET
Tenable
Gaining Visibility of the Entire Ransomware Kill Chain

Gaining Visibility of the Entire Ransomware Kill Chain

Tuesday, June 11, 2024; at 1 PM EDT | Brought to you by Searchlight Cyber

Gaining Visibility of the Entire Ransomware Kill Chain

Tuesday, June 11, 2024; at 1 PM EDT | Brought to you by Searchlight Cyber
Searchlight Cyber
Intruders in the Library: Exploring DLL Hijacking Using Cortex XDR Analytics

Intruders in the Library: Exploring DLL Hijacking Using Cortex XDR Analytics

Thursday, June 13 2024 at 1 PM EDT | Brought to you by Palo Alto Networks

Intruders in the Library: Exploring DLL Hijacking Using Cortex XDR Analytics

Thursday, June 13 2024 at 1 PM EDT | Brought to you by Palo Alto Networks
Palo Alto Networks
Preventing Attackers From Wandering Through Your Enterprise Infrastructure

Preventing Attackers From Wandering Through Your Enterprise Infrastructure

Tuesday, June 18, 2024; at 1 PM EDT | Brought to you by Google Cloud Security

Preventing Attackers From Wandering Through Your Enterprise Infrastructure

Tuesday, June 18, 2024; at 1 PM EDT | Brought to you by Google Cloud Security
Google Cloud Security
AI Fitness v. Readiness: Is Your Security Program Ready to Tackle Generative AI Tools?

AI Fitness v. Readiness: Is Your Security Program Ready to Tackle Generative AI Tools?

Available On-Demand

AI Fitness v. Readiness: Is Your Security Program Ready to Tackle Generative AI Tools?

Available On-Demand
Snyk
Extending Access Management:  Securing Access for all Identities, Devices, and Applications

Extending Access Management: Securing Access for all Identities, Devices, and Applications

Tuesday, June 4, 2024 at 1 PM EST

Extending Access Management: Securing Access for all Identities, Devices, and Applications

Tuesday, June 4, 2024 at 1 PM EST
1Password
DevSecOps in the Cloud

DevSecOps in the Cloud

Wednesday, May 29 2024 at 1 PM EST

DevSecOps in the Cloud

Wednesday, May 29 2024 at 1 PM EST
Wiz
Network Visibility is the Foundation of Zero Trust

Network Visibility is the Foundation of Zero Trust

On Demand Webinar

Network Visibility is the Foundation of Zero Trust

On Demand Webinar
Gigamon
Threat Hunting's Evolution: From On-Premise to the Cloud

Threat Hunting's Evolution: From On-Premise to the Cloud

Wednesday, June 5, 2024; at 1 PM EDT | Brought to you by LogRhythm

Threat Hunting's Evolution: From On-Premise to the Cloud

Wednesday, June 5, 2024; at 1 PM EDT | Brought to you by LogRhythm
LogRhythm
Assessing Software Supply Chain Risk

Assessing Software Supply Chain Risk

Thursday, June 6, 2024 at 1 PM EDT | Brought to you by Apiiro

Assessing Software Supply Chain Risk

Thursday, June 6, 2024 at 1 PM EDT | Brought to you by Apiiro
Apiiro
Why Effective Asset Management is Critical to Enterprise Cybersecurity

Why Effective Asset Management is Critical to Enterprise Cybersecurity

Available On-Demand

Why Effective Asset Management is Critical to Enterprise Cybersecurity

Available On-Demand
Panaseer
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.