Cybersecurity Resource Library

The #1 source for free Cybersecurity reports, whitepapers, webinars, research and more.

Showing results 211 - 240 of 297
Showing results 211 - 240 of 297

Filter by

Filters

2022 SonicWall Cyber Threat Report

2022 SonicWall Cyber Threat Report

Proactive Defense is the Future of Cybersecurity

2022 SonicWall Cyber Threat Report

Proactive Defense is the Future of Cybersecurity
SonicWall
A Requirements-Driven Approach to Cyber Threat Intelligence

A Requirements-Driven Approach to Cyber Threat Intelligence

Structured and repeatable processes should underpin the creation and maintenance of intelligence requirements.

A Requirements-Driven Approach to Cyber Threat Intelligence

Structured and repeatable processes should underpin the creation and maintenance of intelligence requirements.
Mandiant
Aligning Internal Cybersecurity Practices with External Third-Party Risk Management

Aligning Internal Cybersecurity Practices with External Third-Party Risk Management

Recent trends indicate that it’s no longer enough to only address cybersecurity internally.

Aligning Internal Cybersecurity Practices with External Third-Party Risk Management

Recent trends indicate that it’s no longer enough to only address cybersecurity internally.
ProcessUnity
Best Practices for Ongoing Vendor Monitoring

Best Practices for Ongoing Vendor Monitoring

Tips for Continuously Monitoring Your Vendor Landscape

Best Practices for Ongoing Vendor Monitoring

Tips for Continuously Monitoring Your Vendor Landscape
ProcessUnity
Create A Sustainable Cybersecurity Program with Security Control Frameworks

Create A Sustainable Cybersecurity Program with Security Control Frameworks

Build a Control-Centered Universe for Next-Level Cybersecurity Program Management

Create A Sustainable Cybersecurity Program with Security Control Frameworks

Build a Control-Centered Universe for Next-Level Cybersecurity Program Management
ProcessUnity
Determine your Cyber Security Risk with Repurposed Ransomware

Determine your Cyber Security Risk with Repurposed Ransomware

The Serious Threat of Ransomware

Determine your Cyber Security Risk with Repurposed Ransomware

The Serious Threat of Ransomware
Mandiant
Developer-First Security Tools Buyers Guide

Developer-First Security Tools Buyers Guide

As we talk to leaders within IT organizations, it’s clear that there is a need to push security earlier in the cloud environment design process.

Developer-First Security Tools Buyers Guide

As we talk to leaders within IT organizations, it’s clear that there is a need to push security earlier in the cloud environment design process.
Snyk
Developer-Focused Security from Code to Cloud and Back to Code

Developer-Focused Security from Code to Cloud and Back to Code

Discover the importance of application security and cloud security teams working together to deliver more secure cloud native applications in this white paper.

Developer-Focused Security from Code to Cloud and Back to Code

Discover the importance of application security and cloud security teams working together to deliver more secure cloud native applications in this white paper.
Snyk
Five Keys to a Secure Work-From-Anywhere Solution

Five Keys to a Secure Work-From-Anywhere Solution

As organizations adopt hybrid work, they need to extend security to employees no matter where they may be located.

Five Keys to a Secure Work-From-Anywhere Solution

As organizations adopt hybrid work, they need to extend security to employees no matter where they may be located.
Fortinet
Honest Security

Honest Security

" Splendid-- Inform the compliance team we’ve reduced the risk of fire".

Honest Security

" Splendid-- Inform the compliance team we’ve reduced the risk of fire".
Kolide
How to Defend Against Third-Party Ransomware Attacks

How to Defend Against Third-Party Ransomware Attacks

7 steps to mitigate risk, avoid data breaches and keep your organization secure

How to Defend Against Third-Party Ransomware Attacks

7 steps to mitigate risk, avoid data breaches and keep your organization secure
ProcessUnity
Hybrid IT and the 7 Major Challenges That Impede Digital Acceleration

Hybrid IT and the 7 Major Challenges That Impede Digital Acceleration

In today’s digital marketplace, speed and availability are essential

Hybrid IT and the 7 Major Challenges That Impede Digital Acceleration

In today’s digital marketplace, speed and availability are essential
Fortinet
Proactive Preparation and Hardening to Protect Against Destructive Attacks

Proactive Preparation and Hardening to Protect Against Destructive Attacks

Leveraging Mandiant Attack Surface Management or a thirdparty vulnerability scanning technology to identify assets and associated vulnerabilities.

Proactive Preparation and Hardening to Protect Against Destructive Attacks

Leveraging Mandiant Attack Surface Management or a thirdparty vulnerability scanning technology to identify assets and associated vulnerabilities.
Mandiant
Ready or Not: A Ransomware Self-Assessment

Ready or Not: A Ransomware Self-Assessment

Starting with the end goal in mind is the best recommendation for deciding which offensive security program will work best for your organization.

Ready or Not: A Ransomware Self-Assessment

Starting with the end goal in mind is the best recommendation for deciding which offensive security program will work best for your organization.
BishopFox
Remediation and Hardening Strategies for Microsoft 365 to Defend Against APT29

Remediation and Hardening Strategies for Microsoft 365 to Defend Against APT29

Attacker Tactics, Techniques and Procedures (TTPs)

Remediation and Hardening Strategies for Microsoft 365 to Defend Against APT29

Attacker Tactics, Techniques and Procedures (TTPs)
Mandiant
Seven Ways to Avoid the Nightmare of a Cloud Misconfiguration Attack

Seven Ways to Avoid the Nightmare of a Cloud Misconfiguration Attack

Misconfiguration is 100% the result of human error.

Seven Ways to Avoid the Nightmare of a Cloud Misconfiguration Attack

Misconfiguration is 100% the result of human error.
Snyk
Software Vulnerability Snapshot Report

Software Vulnerability Snapshot Report

An Analysis by Synopsys Application Security Testing Services

Software Vulnerability Snapshot Report

An Analysis by Synopsys Application Security Testing Services
WhiteHat Security
State of Email Security

State of Email Security

Confronting the new wave of cyberattacks

State of Email Security

Confronting the new wave of cyberattacks
Mimecast
State of Ransomware Readiness: Facing the Reality Gap

State of Ransomware Readiness: Facing the Reality Gap

Awareness of ransomware and the risk it poses has accelerated dramaticallyin recent months.

State of Ransomware Readiness: Facing the Reality Gap

Awareness of ransomware and the risk it poses has accelerated dramaticallyin recent months.
Mimecast
The 2022 State of Cloud Security Report

The 2022 State of Cloud Security Report

A Report on the Cloud Risks and Security Challenges Organizations are Experiencing in 2022

The 2022 State of Cloud Security Report

A Report on the Cloud Risks and Security Challenges Organizations are Experiencing in 2022
Snyk
The Five Fundamentals of Cloud Security

The Five Fundamentals of Cloud Security

Knowing how developers are building and maintaining cloud environments means you can start empowering them to do so securely, right from the start

The Five Fundamentals of Cloud Security

Knowing how developers are building and maintaining cloud environments means you can start empowering them to do so securely, right from the start
Snyk
The Importance Adopting DevSecOps

The Importance Adopting DevSecOps

While security is "everyone's responsibility", DevOps teams are uniquely positioned at the intersection of development and operations, empowered to apply security in both breadth and depth.

The Importance Adopting DevSecOps

While security is "everyone's responsibility", DevOps teams are uniquely positioned at the intersection of development and operations, empowered to apply security in both breadth and depth.
Snyk
WhiteHat DAST Data Sheet

WhiteHat DAST Data Sheet

Web application security for modern and traditional web frameworks and applications

WhiteHat DAST Data Sheet

Web application security for modern and traditional web frameworks and applications
WhiteHat Security
Work From Anywhere Doesn't Have To Be Complicated

Work From Anywhere Doesn't Have To Be Complicated

Provide Consistent Security No Matter Where Users Are Located

Work From Anywhere Doesn't Have To Be Complicated

Provide Consistent Security No Matter Where Users Are Located
Fortinet
2021 Cyber Threats to Public Safety: Criminal Operations

2021 Cyber Threats to Public Safety: Criminal Operations

Insights from the Motorola Solutions Threat Intelligence Team - Second in a Series

2021 Cyber Threats to Public Safety: Criminal Operations

Insights from the Motorola Solutions Threat Intelligence Team - Second in a Series
Motorola
2022 Cyber Predictions

2022 Cyber Predictions

Here are 11 predictions from Cymulate’s cyber-security experts.

2022 Cyber Predictions

Here are 11 predictions from Cymulate’s cyber-security experts.
Cymulate
3 Approaches to Breach and Attack Simulation

3 Approaches to Breach and Attack Simulation

Read Now

3 Approaches to Breach and Attack Simulation

Read Now
Cymulate
A Case for Evaluating Security After the Cloud Rush

A Case for Evaluating Security After the Cloud Rush

CBI helps organization gain visibility into its cloud security status

A Case for Evaluating Security After the Cloud Rush

CBI helps organization gain visibility into its cloud security status
CreativeBreakthroughs
A Case for Secure-by-Design Cloud Transformation

A Case for Secure-by-Design Cloud Transformation

CBI guides organization on a secure journey to 100% cloud-hosted data centers

A Case for Secure-by-Design Cloud Transformation

CBI guides organization on a secure journey to 100% cloud-hosted data centers
CreativeBreakthroughs
A Detailed Comparison: ZTNA vs On-Premises Firewall VPN

A Detailed Comparison: ZTNA vs On-Premises Firewall VPN

Securing Today’s Remote Workspaces

A Detailed Comparison: ZTNA vs On-Premises Firewall VPN

Securing Today’s Remote Workspaces
Perimeter 81
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.