Cybersecurity Resource Library

The #1 source for free Cybersecurity reports, whitepapers, webinars, research and more.

Showing results 1 - 30 of 156
Showing results 1 - 30 of 156

Filter by

Filters

Data Protection Essentials: Proactive PII Leak Prevention and Data Mapping for GDPR

Data Protection Essentials: Proactive PII Leak Prevention and Data Mapping for GDPR

Join the former CISO of UiPath, Okta, Splunk, and SoFi to learn proactive approaches for preventing PII leaks and automating data mapping for compliance. Remediating PII leaks in production is costly and disruptive, while GDPR compliance often relies on manual spreadsheets and surveys. This session covers controls to minimize PII leak risks and streamline data mapping for compliance, featuring a new AI-powered code scanner that stops PII leaks at the code level and automates the creation of RoPA

Data Protection Essentials: Proactive PII Leak Prevention and Data Mapping for GDPR

Join the former CISO of UiPath, Okta, Splunk, and SoFi to learn proactive approaches for preventing PII leaks and automating data mapping for compliance. Remediating PII leaks in production is costly and disruptive, while GDPR compliance often relies on manual spreadsheets and surveys. This session covers controls to minimize PII leak risks and streamline data mapping for compliance, featuring a new AI-powered code scanner that stops PII leaks at the code level and automates the creation of RoPA
HoundDog.ai
All the Ways the Internet is Surveilling You

All the Ways the Internet is Surveilling You

Thursday, July 25, 2024 at 1 PM EST

All the Ways the Internet is Surveilling You

Thursday, July 25, 2024 at 1 PM EST
Knowbe4
Next Generation Supply Chain Security

Next Generation Supply Chain Security

Thursday, July 11, 2024 at 1 PM EDT | Brought to you by Snyk

Next Generation Supply Chain Security

Thursday, July 11, 2024 at 1 PM EDT | Brought to you by Snyk
Snyk
Mind the Cyber Resilience Gap

Mind the Cyber Resilience Gap

View On-Demand

Mind the Cyber Resilience Gap

View On-Demand
Commvault
Protecting the Crown Jewels: Source Code Security

Protecting the Crown Jewels: Source Code Security

Wednesday, July 17, 2024 at 1 PM EDT | Brought to you by Mend.io

Protecting the Crown Jewels: Source Code Security

Wednesday, July 17, 2024 at 1 PM EDT | Brought to you by Mend.io
Mend.io
Empowering Developers, Automating Security: The Future of AppSec

Empowering Developers, Automating Security: The Future of AppSec

Thursday, June 27, 2024 at 1 PM EDT | Brought to you by Snyk

Empowering Developers, Automating Security: The Future of AppSec

Thursday, June 27, 2024 at 1 PM EDT | Brought to you by Snyk
Snyk
Cutting Through the AI Hype: Practical Strategies for Real-World Cybersecurity Success

Cutting Through the AI Hype: Practical Strategies for Real-World Cybersecurity Success

Wednesday, July 17, 2024; at 1 PM EDT | Brought to you by Sophos

Cutting Through the AI Hype: Practical Strategies for Real-World Cybersecurity Success

Wednesday, July 17, 2024; at 1 PM EDT | Brought to you by Sophos
Sophos Inc.
Gigamon CISO Series: Analyst Research on Supercharging Observability and AIOps with Network Telemetry

Gigamon CISO Series: Analyst Research on Supercharging Observability and AIOps with Network Telemetry

Available On-Demand

Gigamon CISO Series: Analyst Research on Supercharging Observability and AIOps with Network Telemetry

Available On-Demand
Gigamon
How to Use Threat Intelligence to Mitigate Third Party Risk

How to Use Threat Intelligence to Mitigate Third Party Risk

Wednesday, July 10, 2024 at 1 PM EDT | Brought to you by Cyble

How to Use Threat Intelligence to Mitigate Third Party Risk

Wednesday, July 10, 2024 at 1 PM EDT | Brought to you by Cyble
Cyble
Become a Cloud Security Expert in Under 48 Hours: Learn how to find, prioritize, and remediate risks in the cloud without adding complexity

Become a Cloud Security Expert in Under 48 Hours: Learn how to find, prioritize, and remediate risks in the cloud without adding complexity

Monday, May 6, 2024 at 1pm ET

Become a Cloud Security Expert in Under 48 Hours: Learn how to find, prioritize, and remediate risks in the cloud without adding complexity

Monday, May 6, 2024 at 1pm ET
Tenable
Gaining Visibility of the Entire Ransomware Kill Chain

Gaining Visibility of the Entire Ransomware Kill Chain

Tuesday, June 11, 2024; at 1 PM EDT | Brought to you by Searchlight Cyber

Gaining Visibility of the Entire Ransomware Kill Chain

Tuesday, June 11, 2024; at 1 PM EDT | Brought to you by Searchlight Cyber
Searchlight Cyber
Intruders in the Library: Exploring DLL Hijacking Using Cortex XDR Analytics

Intruders in the Library: Exploring DLL Hijacking Using Cortex XDR Analytics

Thursday, June 13 2024 at 1 PM EDT | Brought to you by Palo Alto Networks

Intruders in the Library: Exploring DLL Hijacking Using Cortex XDR Analytics

Thursday, June 13 2024 at 1 PM EDT | Brought to you by Palo Alto Networks
Palo Alto Networks
Preventing Attackers From Wandering Through Your Enterprise Infrastructure

Preventing Attackers From Wandering Through Your Enterprise Infrastructure

Tuesday, June 18, 2024; at 1 PM EDT | Brought to you by Google Cloud Security

Preventing Attackers From Wandering Through Your Enterprise Infrastructure

Tuesday, June 18, 2024; at 1 PM EDT | Brought to you by Google Cloud Security
Google Cloud Security
AI Fitness v. Readiness: Is Your Security Program Ready to Tackle Generative AI Tools?

AI Fitness v. Readiness: Is Your Security Program Ready to Tackle Generative AI Tools?

Available On-Demand

AI Fitness v. Readiness: Is Your Security Program Ready to Tackle Generative AI Tools?

Available On-Demand
Snyk
Extending Access Management:  Securing Access for all Identities, Devices, and Applications

Extending Access Management: Securing Access for all Identities, Devices, and Applications

Tuesday, June 4, 2024 at 1 PM EST

Extending Access Management: Securing Access for all Identities, Devices, and Applications

Tuesday, June 4, 2024 at 1 PM EST
1Password
DevSecOps in the Cloud

DevSecOps in the Cloud

Wednesday, May 29 2024 at 1 PM EST

DevSecOps in the Cloud

Wednesday, May 29 2024 at 1 PM EST
Wiz
Network Visibility is the Foundation of Zero Trust

Network Visibility is the Foundation of Zero Trust

On Demand Webinar

Network Visibility is the Foundation of Zero Trust

On Demand Webinar
Gigamon
Threat Hunting's Evolution: From On-Premise to the Cloud

Threat Hunting's Evolution: From On-Premise to the Cloud

Wednesday, June 5, 2024; at 1 PM EDT | Brought to you by LogRhythm

Threat Hunting's Evolution: From On-Premise to the Cloud

Wednesday, June 5, 2024; at 1 PM EDT | Brought to you by LogRhythm
LogRhythm
Assessing Software Supply Chain Risk

Assessing Software Supply Chain Risk

Thursday, June 6, 2024 at 1 PM EDT | Brought to you by Apiiro

Assessing Software Supply Chain Risk

Thursday, June 6, 2024 at 1 PM EDT | Brought to you by Apiiro
Apiiro
Why Effective Asset Management is Critical to Enterprise Cybersecurity

Why Effective Asset Management is Critical to Enterprise Cybersecurity

Available On-Demand

Why Effective Asset Management is Critical to Enterprise Cybersecurity

Available On-Demand
Panaseer
Is AI Identifying Threats to Your Network?

Is AI Identifying Threats to Your Network?

Tuesday, May 14, 2024 at 1pm EDT |Brought to you by Dark Reading

Is AI Identifying Threats to Your Network?

Tuesday, May 14, 2024 at 1pm EDT |Brought to you by Dark Reading
OpenText
Finding Your Way on the Path to Zero Trust

Finding Your Way on the Path to Zero Trust

Available On-Demand

Finding Your Way on the Path to Zero Trust

Available On-Demand
ExtraHop
Safeguarding Political Campaigns: Defending Against Mass Phishing Attacks

Safeguarding Political Campaigns: Defending Against Mass Phishing Attacks

Thursday, May 16, 2024 at 1 PM EST

Safeguarding Political Campaigns: Defending Against Mass Phishing Attacks

Thursday, May 16, 2024 at 1 PM EST
Sophos
Where and Why Threat Intelligence Makes Sense for Your Enterprise Security Strategy

Where and Why Threat Intelligence Makes Sense for Your Enterprise Security Strategy

Wednesday, May 15, 2024 at 1 PM EDT | Brought to you by Dark Reading

Where and Why Threat Intelligence Makes Sense for Your Enterprise Security Strategy

Wednesday, May 15, 2024 at 1 PM EDT | Brought to you by Dark Reading
Infoblox
The fuel in the new AI race: Data

The fuel in the new AI race: Data

Tuesday, April 23 at 1:00pm EST | Brought to you by Rubrik

The fuel in the new AI race: Data

Tuesday, April 23 at 1:00pm EST | Brought to you by Rubrik
Rubrik
Key Findings from the State of AppSec Report 2024

Key Findings from the State of AppSec Report 2024

Tuesday, May 7, 2024 2 at 1 PM EDT

Key Findings from the State of AppSec Report 2024

Tuesday, May 7, 2024 2 at 1 PM EDT
OpenText
Beyond Spam Filters and Firewalls: Preventing Business Email Compromises in the Modern Enterprise

Beyond Spam Filters and Firewalls: Preventing Business Email Compromises in the Modern Enterprise

Available On-Demand

Beyond Spam Filters and Firewalls: Preventing Business Email Compromises in the Modern Enterprise

Available On-Demand
Darktrace
Defending Against Today's Threat Landscape with MDR

Defending Against Today's Threat Landscape with MDR

Thursday, April 18, 2024 at 1 PM ET | Brought to you by Palo Alto Networks

Defending Against Today's Threat Landscape with MDR

Thursday, April 18, 2024 at 1 PM ET | Brought to you by Palo Alto Networks
Palo Alto Networks
The Modern Kill Chain: How Attacks Have Gone From Months to Minutes

The Modern Kill Chain: How Attacks Have Gone From Months to Minutes

On Demand Webinar | Brought to you by Lookout

The Modern Kill Chain: How Attacks Have Gone From Months to Minutes

On Demand Webinar | Brought to you by Lookout
Lookout
Outsourcing Security Without Inviting Risk and Wasting Money

Outsourcing Security Without Inviting Risk and Wasting Money

Available On-Demand

Outsourcing Security Without Inviting Risk and Wasting Money

Available On-Demand
HID Global Corporation
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.