Sponsored By

Cybersecurity Resource Library

The #1 source for free Cybersecurity reports, whitepapers, webinars, research and more.

Showing results 1 - 30 of 125
Showing results 1 - 30 of 125

Filter by

Filters

The Anatomy of a Ransomware Attack, Revealed

The Anatomy of a Ransomware Attack, Revealed

| Live Webinar | Wednesday, March 20, 2024 | 1pm ET |

The Anatomy of a Ransomware Attack, Revealed

| Live Webinar | Wednesday, March 20, 2024 | 1pm ET |
ExtraHop
Unleash the Power of Gen AI for Application Development, Securely

Unleash the Power of Gen AI for Application Development, Securely

Live Webinar | March 19, 2024 | 1pm ET

Unleash the Power of Gen AI for Application Development, Securely

Live Webinar | March 19, 2024 | 1pm ET
Snyk
5 Pragmatic Tips for Preventing Ransomware

5 Pragmatic Tips for Preventing Ransomware

Available On-Demand

5 Pragmatic Tips for Preventing Ransomware

Available On-Demand
Gigamon
Assessing Your Critical Applications' Cyber Defenses

Assessing Your Critical Applications' Cyber Defenses

| Live Webinar | Wednesday, March 13th, 2024 | 1pm ET |

Assessing Your Critical Applications' Cyber Defenses

| Live Webinar | Wednesday, March 13th, 2024 | 1pm ET |
Mandiant
Building a Modern Endpoint Strategy for 2024 and Beyond

Building a Modern Endpoint Strategy for 2024 and Beyond

| Live Webinar | Wednesday, March 27, 2024 | 1pm ET |

Building a Modern Endpoint Strategy for 2024 and Beyond

| Live Webinar | Wednesday, March 27, 2024 | 1pm ET |
Sophos
Cyber-Proof Petabytes of NAS Data at Scale with Rubrik and AWS

Cyber-Proof Petabytes of NAS Data at Scale with Rubrik and AWS

Available On-Demand

Cyber-Proof Petabytes of NAS Data at Scale with Rubrik and AWS

Available On-Demand
Rubrik
How Supply Chain Attacks Work -- And How to Stop Them

How Supply Chain Attacks Work -- And How to Stop Them

| Live Webinar | Thursday, March 7, 2024 | 1pm ET |

How Supply Chain Attacks Work -- And How to Stop Them

| Live Webinar | Thursday, March 7, 2024 | 1pm ET |
JFrog
The Evolution of AI, ML and Gen AI in Identity Products and Solutions

The Evolution of AI, ML and Gen AI in Identity Products and Solutions

In this webinar Omdia will discuss the evolution of identity in AI, ML and Gen AI.

The Evolution of AI, ML and Gen AI in Identity Products and Solutions

In this webinar Omdia will discuss the evolution of identity in AI, ML and Gen AI.
Okta
Unbiased Testing. Unbeatable Results

Unbiased Testing. Unbeatable Results

| Live Webinar | Thursday, February 22, 2024 | 1pm ET |

Unbiased Testing. Unbeatable Results

| Live Webinar | Thursday, February 22, 2024 | 1pm ET |
Palo Alto Networks
Your Everywhere Security guide: Four steps to stop cyberattacks

Your Everywhere Security guide: Four steps to stop cyberattacks

| Live Webinar | Tuesday, February 27, 2024 | 1pm ET |

Your Everywhere Security guide: Four steps to stop cyberattacks

| Live Webinar | Tuesday, February 27, 2024 | 1pm ET |
Cloudflare
Making Sense of Security Operations Data

Making Sense of Security Operations Data

| Live Webinar | Wednesday, February 21, 2024 | 1pm ET |

Making Sense of Security Operations Data

| Live Webinar | Wednesday, February 21, 2024 | 1pm ET |
Mandiant
Securing the Software Development Life Cycle from Start to Finish

Securing the Software Development Life Cycle from Start to Finish

| Live Webinar | Wednesday, March 6, 2024 | 1pm ET |

Securing the Software Development Life Cycle from Start to Finish

| Live Webinar | Wednesday, March 6, 2024 | 1pm ET |
Palo Alto Networks
API Security: Protecting Your Application's Attack Surface

API Security: Protecting Your Application's Attack Surface

| Live Webinar | Thursday, February 29, 2024 | 1pm ET |

API Security: Protecting Your Application's Attack Surface

| Live Webinar | Thursday, February 29, 2024 | 1pm ET |
Apiiro
How Top Cybersecurity Experts Predict Threats and Navigate Risk

How Top Cybersecurity Experts Predict Threats and Navigate Risk

Available On-Demand

How Top Cybersecurity Experts Predict Threats and Navigate Risk

Available On-Demand
Rubrik
Top Cloud Security Threats Targeting Today's Enterprises

Top Cloud Security Threats Targeting Today's Enterprises

| Live Webinar | Thursday, February 8, 2024 | 1pm ET |

Top Cloud Security Threats Targeting Today's Enterprises

| Live Webinar | Thursday, February 8, 2024 | 1pm ET |
Darktrace
DevSecOps: The Smart Way to Shift Left

DevSecOps: The Smart Way to Shift Left

| Live Webinar | Wednesday, February 14, 2024 | 1pm ET |

DevSecOps: The Smart Way to Shift Left

| Live Webinar | Wednesday, February 14, 2024 | 1pm ET |
Palo Alto Networks
Tips for Managing Cloud Security in a Hybrid Environment

Tips for Managing Cloud Security in a Hybrid Environment

| Live Webinar | Thursday, February 1, 2024 | 1pm ET |

Tips for Managing Cloud Security in a Hybrid Environment

| Live Webinar | Thursday, February 1, 2024 | 1pm ET |
Wiz
Elevating Your Data Security Game: Strengthening Your Security Posture Against Cyber Threats

Elevating Your Data Security Game: Strengthening Your Security Posture Against Cyber Threats

Available On-Demand

Elevating Your Data Security Game: Strengthening Your Security Posture Against Cyber Threats

Available On-Demand
Rubrik
Finding Issues that Matter in Open Source Dependencies and Fixing them Without Developer Friction

Finding Issues that Matter in Open Source Dependencies and Fixing them Without Developer Friction

Available On-Demand

Finding Issues that Matter in Open Source Dependencies and Fixing them Without Developer Friction

Available On-Demand
Semgrep
2024 API Security Trends & Predictions: A Cloudflare discussion featuring Melinda Marks, ESG Senior Analyst

2024 API Security Trends & Predictions: A Cloudflare discussion featuring Melinda Marks, ESG Senior Analyst

| On-Demand | Wednesday, January 10, 2024 | 1pm ET |

2024 API Security Trends & Predictions: A Cloudflare discussion featuring Melinda Marks, ESG Senior Analyst

| On-Demand | Wednesday, January 10, 2024 | 1pm ET |
Cloudflare
How to Fortify OT Environments: Protecting Third-Party Remote Access

How to Fortify OT Environments: Protecting Third-Party Remote Access

In today's interconnected world, remote access to OT systems is crucial for efficiency, but it also presents security challenges that must be addressed

How to Fortify OT Environments: Protecting Third-Party Remote Access

In today's interconnected world, remote access to OT systems is crucial for efficiency, but it also presents security challenges that must be addressed
WALLIX
What's In Your Cloud?

What's In Your Cloud?

| Live Webinar | Wednesday, January 17, 2024 | 1pm ET |

What's In Your Cloud?

| Live Webinar | Wednesday, January 17, 2024 | 1pm ET |
Prisma Cloud by Palo Alto Networks
Everything You Need to Know About DNS Attacks

Everything You Need to Know About DNS Attacks

| Live Webinar | Thursday, January 18, 2024 | 1pm ET |

Everything You Need to Know About DNS Attacks

| Live Webinar | Thursday, January 18, 2024 | 1pm ET |
Infoblox
State of Secure Identities 2023

State of Secure Identities 2023

What insights have we gained from protecting billions of logins weekly?

State of Secure Identities 2023

What insights have we gained from protecting billions of logins weekly?
Okta
Automate to Accelerate: Overcoming Staffing and Compliance Challenges in Cyber Risk Management

Automate to Accelerate: Overcoming Staffing and Compliance Challenges in Cyber Risk Management

In today's cybersecurity landscape, teams dedicate countless hours each year collecting evidence to prove compliance with regulatory and standards mandates.

Automate to Accelerate: Overcoming Staffing and Compliance Challenges in Cyber Risk Management

In today's cybersecurity landscape, teams dedicate countless hours each year collecting evidence to prove compliance with regulatory and standards mandates.
LogicGate
How to Combat the Latest Cloud Security Threats

How to Combat the Latest Cloud Security Threats

| Live Webinar | Thursday, December 7, 2023 | 1pm ET |

How to Combat the Latest Cloud Security Threats

| Live Webinar | Thursday, December 7, 2023 | 1pm ET |
Rubrik
Is SASE Practical for Your Organization?

Is SASE Practical for Your Organization?

Available on Demand

Is SASE Practical for Your Organization?

Available on Demand
ConRes
Modern Supply Chain Security: Integrated, Interconnected, and Context-Driven

Modern Supply Chain Security: Integrated, Interconnected, and Context-Driven

| Live Webinar | Wednesday, December 6, 2023 | 1pm ET |

Modern Supply Chain Security: Integrated, Interconnected, and Context-Driven

| Live Webinar | Wednesday, December 6, 2023 | 1pm ET |
Apiiro
Tricks to Boost Your Threat Hunting Game

Tricks to Boost Your Threat Hunting Game

| Live Webinar | Tuesday, November 28, 2023 | 1pm ET |

Tricks to Boost Your Threat Hunting Game

| Live Webinar | Tuesday, November 28, 2023 | 1pm ET |
Sophos
SecOps & DevSecOps in the Cloud

SecOps & DevSecOps in the Cloud

| Live Webinar | Thursday, December 14, 2023 | 1pm ET |

SecOps & DevSecOps in the Cloud

| Live Webinar | Thursday, December 14, 2023 | 1pm ET |
Palo Alto Networks
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.