Cybersecurity Resource Library

The #1 source for free Cybersecurity reports, whitepapers, webinars, research and more.

Showing results 1 - 30 of 1019
Showing results 1 - 30 of 1019

Filter by

Filters

Cyera Breach Readiness | Service Datasheet

Cyera Breach Readiness | Service Datasheet

Leverage and retain a team of elite cybersecurity practitioners from Cyera to evaluate and respond to data security incidents post breach, helping you identify data security risks, remove ambiguity related to materiality, and determine the fastest path to recovery.

Cyera Breach Readiness | Service Datasheet

Leverage and retain a team of elite cybersecurity practitioners from Cyera to evaluate and respond to data security incidents post breach, helping you identify data security risks, remove ambiguity related to materiality, and determine the fastest path to recovery.
Cyera
Securing Business Data In the Age of AI with Cyera

Securing Business Data In the Age of AI with Cyera

Data is the fuel that drives growth and efficiency for every business- enabling businesses to innovate, transform to cloud, and unlock AI for business. According to Gartner's 2025 Finance Executive Priorities Survey, data, metrics and analytics are the number one priority for Chief Financial Officers. It also found that 75% of CFOs are responsible for enterprise-wide data and analytics. Check out this eBook to learn more.

Securing Business Data In the Age of AI with Cyera

Data is the fuel that drives growth and efficiency for every business- enabling businesses to innovate, transform to cloud, and unlock AI for business. According to Gartner's 2025 Finance Executive Priorities Survey, data, metrics and analytics are the number one priority for Chief Financial Officers. It also found that 75% of CFOs are responsible for enterprise-wide data and analytics. Check out this eBook to learn more.
Cyera
Securing the Remote Workforce

Securing the Remote Workforce

Thursday, February 20, 2025 at 1 PM EDT

Securing the Remote Workforce

Thursday, February 20, 2025 at 1 PM EDT
Palo Alto Networks
The 2024 DSPM Adoption Report

The 2024 DSPM Adoption Report

This 2024 DSPM Adoption Report is based on a comprehensive survey of 637 IT and cybersecurity professionals that reveals how organizations are approaching DSPM, the challenges they face, the effectiveness of their current solutions, and their adoption plan over the next 12 months. Through this survey, we uncover the critical needs and priorities of enterprises when it comes to securing their data across various environments.

The 2024 DSPM Adoption Report

This 2024 DSPM Adoption Report is based on a comprehensive survey of 637 IT and cybersecurity professionals that reveals how organizations are approaching DSPM, the challenges they face, the effectiveness of their current solutions, and their adoption plan over the next 12 months. Through this survey, we uncover the critical needs and priorities of enterprises when it comes to securing their data across various environments.
Cyera
Why DSPM is Core to Every Enterprise Data Security Program

Why DSPM is Core to Every Enterprise Data Security Program

Data Security Posture Management (DSPM) gives you the visibility and insights to safeguard your data and reduce risks effectively. This eBook highlights why DSPM is vital for modern data security programs and how it works with the security solutions you already have in place.

Why DSPM is Core to Every Enterprise Data Security Program

Data Security Posture Management (DSPM) gives you the visibility and insights to safeguard your data and reduce risks effectively. This eBook highlights why DSPM is vital for modern data security programs and how it works with the security solutions you already have in place.
Cyera
2025 Outlook for Security and Telemetry Data

2025 Outlook for Security and Telemetry Data

Unlock the Future of Telemetry Data and Security in 2025 The digital landscape is evolving at breakneck speed, presenting both challenges and opportunities for IT, Security, and Compliance teams. Are you ready for what’s next?

2025 Outlook for Security and Telemetry Data

Unlock the Future of Telemetry Data and Security in 2025 The digital landscape is evolving at breakneck speed, presenting both challenges and opportunities for IT, Security, and Compliance teams. Are you ready for what’s next?
Cribl
How to survive Cloud Migration

How to survive Cloud Migration

Migrating to the cloud offers cost efficiency and agility, but focusing solely on BI data while neglecting IT and Security planning can lead to security gaps, compliance issues, and costly downtime. Discover how to navigate IT and Security data challenges for a smoother, safer transition.

How to survive Cloud Migration

Migrating to the cloud offers cost efficiency and agility, but focusing solely on BI data while neglecting IT and Security planning can lead to security gaps, compliance issues, and costly downtime. Discover how to navigate IT and Security data challenges for a smoother, safer transition.
Cribl
Navigating the future of IT and Security Data Management

Navigating the future of IT and Security Data Management

The escalating data challenges faced by IT and security teams won’t be resolved with legacy approaches, or with new tools built on outmoded data infrastructure. Read how adopting a composable data infrastructure designed for the unique and diverse needs of today’s IT and security teams, organizations can navigate this data storm efficiently.

Navigating the future of IT and Security Data Management

The escalating data challenges faced by IT and security teams won’t be resolved with legacy approaches, or with new tools built on outmoded data infrastructure. Read how adopting a composable data infrastructure designed for the unique and diverse needs of today’s IT and security teams, organizations can navigate this data storm efficiently.
Cribl
The State of the SIEM Market with Cribl and Crowdstrike

The State of the SIEM Market with Cribl and Crowdstrike

Legacy SIEMs are falling behind. As data floods in from every corner of your environment, bottlenecks, high costs, and security gaps hold security teams back from detecting and responding to threats in real time. Learn about some of the latest trends in the market and how companies like CrowdStrike and Cribl are reshaping the landscape with seamless data routing, high-fidelity detection, and automated response.

The State of the SIEM Market with Cribl and Crowdstrike

Legacy SIEMs are falling behind. As data floods in from every corner of your environment, bottlenecks, high costs, and security gaps hold security teams back from detecting and responding to threats in real time. Learn about some of the latest trends in the market and how companies like CrowdStrike and Cribl are reshaping the landscape with seamless data routing, high-fidelity detection, and automated response.
Cribl
EDR, SIEM, SOAR, and MORE: How to Determine the Right Endpoint Strategy for Your Enterprise

EDR, SIEM, SOAR, and MORE: How to Determine the Right Endpoint Strategy for Your Enterprise

Wednesday, March 19, 2025 at 1 PM EST

EDR, SIEM, SOAR, and MORE: How to Determine the Right Endpoint Strategy for Your Enterprise

Wednesday, March 19, 2025 at 1 PM EST
Palo Alto
Where Does Outsourcing Make Sense for Your Organization?

Where Does Outsourcing Make Sense for Your Organization?

Thursday, February 27, 2025 at 1 PM EDT

Where Does Outsourcing Make Sense for Your Organization?

Thursday, February 27, 2025 at 1 PM EDT
Calian
Uncovering Threats to Your Mainframe & How to Keep Host Access Secure

Uncovering Threats to Your Mainframe & How to Keep Host Access Secure

Thursday, February 13, 2025 at 1 PM EDT

Uncovering Threats to Your Mainframe & How to Keep Host Access Secure

Thursday, February 13, 2025 at 1 PM EDT
Rocket Software
60 Facts to Know For the Modern CISO

60 Facts to Know For the Modern CISO

Find out why 60% of organizations lack confidence in their defenses and how you can break the cycle. The Big CISO Factbook is your essential guide to overcoming today's most pressing security challenges.

60 Facts to Know For the Modern CISO

Find out why 60% of organizations lack confidence in their defenses and how you can break the cycle. The Big CISO Factbook is your essential guide to overcoming today's most pressing security challenges.
GYTPOL
A Gap Analysis of Endpoint Configuration Security

A Gap Analysis of Endpoint Configuration Security

Every year, over 4,000 ransomware attacks take advantage of device misconfigurations. Hackers exploit these security gaps to gain easy access and move laterally. Proactive protection demands smart, well-maintained configurations. Most organization fall short. Are you among them?

A Gap Analysis of Endpoint Configuration Security

Every year, over 4,000 ransomware attacks take advantage of device misconfigurations. Hackers exploit these security gaps to gain easy access and move laterally. Proactive protection demands smart, well-maintained configurations. Most organization fall short. Are you among them?
GYTPOL
The Security Team's Guide to Reducing SIEM Costs

The Security Team's Guide to Reducing SIEM Costs

Available On-Demand

The Security Team's Guide to Reducing SIEM Costs

Available On-Demand
Chronosphere
4 Best Practices for Hybrid Security Policy Management

4 Best Practices for Hybrid Security Policy Management

Networks are evolving and your network security is getting more complex. Download this white paper to explore the challenges of managing security policies across hybrid infrastructures and four best practices to overcome these challenges.

4 Best Practices for Hybrid Security Policy Management

Networks are evolving and your network security is getting more complex. Download this white paper to explore the challenges of managing security policies across hybrid infrastructures and four best practices to overcome these challenges.
Tufin
How CISOs Navigate the Regulatory and Compliance Maze

How CISOs Navigate the Regulatory and Compliance Maze

Wednesday, February 26, 2025 at 1 PM EST

How CISOs Navigate the Regulatory and Compliance Maze

Wednesday, February 26, 2025 at 1 PM EST
Black Duck Software
The State of Firewall Security: Challenges, Risks, and Solutions for Modern Networks

The State of Firewall Security: Challenges, Risks, and Solutions for Modern Networks

The Evolving Landscape of Network Security in 2025

The State of Firewall Security: Challenges, Risks, and Solutions for Modern Networks

The Evolving Landscape of Network Security in 2025
Tufin
Tips on Managing Cloud Security in a Hybrid Environment

Tips on Managing Cloud Security in a Hybrid Environment

Wednesday, January 29, 2025 at 1 PM EDT

Tips on Managing Cloud Security in a Hybrid Environment

Wednesday, January 29, 2025 at 1 PM EDT
CyberArk Software
How to Use AI for Security Good

How to Use AI for Security Good

| Special Keynote | Thursday, January 30, 2025| 2:00pm ET | Cybersecurity Outlook 2025 Virtual Event | Dark Reading and Omdia

How to Use AI for Security Good

| Special Keynote | Thursday, January 30, 2025| 2:00pm ET | Cybersecurity Outlook 2025 Virtual Event | Dark Reading and Omdia
Dark Reading
The Pragmatic CISO's New Year's Resolutions for 2025

The Pragmatic CISO's New Year's Resolutions for 2025

| Special Keynote | Thursday, January 30, 2025 | 1:00pm ET | Cybersecurity Outlook 2025 Virtual Event | Dark Reading and Omdia

The Pragmatic CISO's New Year's Resolutions for 2025

| Special Keynote | Thursday, January 30, 2025 | 1:00pm ET | Cybersecurity Outlook 2025 Virtual Event | Dark Reading and Omdia
Dark Reading
Shifting Left: DevSecOps in the Cloud

Shifting Left: DevSecOps in the Cloud

Tuesday, February 4, 2025 at 1 PM EST

Shifting Left: DevSecOps in the Cloud

Tuesday, February 4, 2025 at 1 PM EST
Wiz
Social Engineering: New Tricks, New Threats, New Defenses

Social Engineering: New Tricks, New Threats, New Defenses

This is an executive summary of the “Social Engineering: New Tricks, New Threats, New Defenses” webinar that took place October 22, 2024. The speaker was Yihao Lim, Lead Threat Intelligence Advisor, Google Cloud Security. The webinar was moderated by Peter Krass, editor at Dark Reading.

Social Engineering: New Tricks, New Threats, New Defenses

This is an executive summary of the “Social Engineering: New Tricks, New Threats, New Defenses” webinar that took place October 22, 2024. The speaker was Yihao Lim, Lead Threat Intelligence Advisor, Google Cloud Security. The webinar was moderated by Peter Krass, editor at Dark Reading.
Google Cloud Security
Understanding Social Engineering Attacks and What To Do About Them

Understanding Social Engineering Attacks and What To Do About Them

Social engineering attacks are getting more sophisticated. This just-released Dark Reading report examines the latest social engineering threats and defenses. Enterprise security teams are adapting to the latest threats with multi-layered defense and improved training.

Understanding Social Engineering Attacks and What To Do About Them

Social engineering attacks are getting more sophisticated. This just-released Dark Reading report examines the latest social engineering threats and defenses. Enterprise security teams are adapting to the latest threats with multi-layered defense and improved training.
Google Cloud Security
6 Best Practices for Developer Security in a Financial Services Institution

6 Best Practices for Developer Security in a Financial Services Institution

Developer security best practices for FinServ

6 Best Practices for Developer Security in a Financial Services Institution

Developer security best practices for FinServ
Snyk
DSPM Buyer's Guide

DSPM Buyer's Guide

DSPM and DDR are emerging technologies that many vendors claim to offer. However, the lack of sufficient analyst research and customer testimonials around these technologies makes them hard to evaluate. This guide provides a framework for security leaders to evaluate DSPM and DDR technologies, based on the challenges you are looking to address.

DSPM Buyer's Guide

DSPM and DDR are emerging technologies that many vendors claim to offer. However, the lack of sufficient analyst research and customer testimonials around these technologies makes them hard to evaluate. This guide provides a framework for security leaders to evaluate DSPM and DDR technologies, based on the challenges you are looking to address.
Cyera
Optimizing AppSec in the Financial Services Sector

Optimizing AppSec in the Financial Services Sector

A buyer’s guide for meeting the unprecedented speed and complexity of today’s development practices

Optimizing AppSec in the Financial Services Sector

A buyer’s guide for meeting the unprecedented speed and complexity of today’s development practices
Snyk
ASRM Cyberisk

ASRM Cyberisk

Getting under the surface of your Cyber Risk

ASRM Cyberisk

Getting under the surface of your Cyber Risk
Trend Micro, Inc.
ASRM Use Case Risk Prioritization

ASRM Use Case Risk Prioritization

Elevate Your Risk Prioritization & Mitigation

ASRM Use Case Risk Prioritization

Elevate Your Risk Prioritization & Mitigation
Trend Micro, Inc.
IDC Tech Assessment Guide ASRM

IDC Tech Assessment Guide ASRM

Across the Entire Attack Surface: Risk Requires a Platform

IDC Tech Assessment Guide ASRM

Across the Entire Attack Surface: Risk Requires a Platform
Trend Micro, Inc.
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.