Cybersecurity Resource Library

The #1 source for free Cybersecurity reports, whitepapers, webinars, research and more.

Showing results 1 - 30 of 997
Showing results 1 - 30 of 997

Filter by

Filters

4 Steps to Deploying an AppSec Training Program

4 Steps to Deploying an AppSec Training Program

You can uplevel cybersecurity awareness and improve application security in four simple steps with this AppSec training program guide from CMD+CTRL Security.

4 Steps to Deploying an AppSec Training Program

You can uplevel cybersecurity awareness and improve application security in four simple steps with this AppSec training program guide from CMD+CTRL Security.
CMD+CTRL Security
Enhancing Cybersecurity: The Critical Role Of Software Security Training

Enhancing Cybersecurity: The Critical Role Of Software Security Training

Software vulnerabilities can have a critical impact on operations, from financial losses to delayed time-to-market. Our study found that 89% of developers receive significant security training while other stakeholders often lag behind. Learn more about the critical need for role-based training across all stages of the development lifecycle to reduce organizational risk.

Enhancing Cybersecurity: The Critical Role Of Software Security Training

Software vulnerabilities can have a critical impact on operations, from financial losses to delayed time-to-market. Our study found that 89% of developers receive significant security training while other stakeholders often lag behind. Learn more about the critical need for role-based training across all stages of the development lifecycle to reduce organizational risk.
CMD+CTRL Security
Identifying the Cybersecurity Metrics that Actually Matter

Identifying the Cybersecurity Metrics that Actually Matter

Wednesday, December 11, 2024 at 1 PM EST

Identifying the Cybersecurity Metrics that Actually Matter

Wednesday, December 11, 2024 at 1 PM EST
Axonius
Solution Brief: Introducing the runZero Platform

Solution Brief: Introducing the runZero Platform

runZero is the only CAASM (cyber asset attack surface management) solution that combines powerful proprietary active scanning, native passive discovery and API integrations. Unifying these discovery approaches makes our platform unique in its ability to discover and provide accurate, in-depth fingerprinting for all IT, OT, and IoT devices across on-prem, cloud, and remote environments, including identifying risky unmanaged assets, unknown networks, and outliers. Learn more in our solution brief

Solution Brief: Introducing the runZero Platform

runZero is the only CAASM (cyber asset attack surface management) solution that combines powerful proprietary active scanning, native passive discovery and API integrations. Unifying these discovery approaches makes our platform unique in its ability to discover and provide accurate, in-depth fingerprinting for all IT, OT, and IoT devices across on-prem, cloud, and remote environments, including identifying risky unmanaged assets, unknown networks, and outliers. Learn more in our solution brief
runZero
The State of Asset Security: Uncovering Alarming Gaps & Unexpected Exposures

The State of Asset Security: Uncovering Alarming Gaps & Unexpected Exposures

runZero's research team analyzed tens of millions of data points to understand attack surfaces, exposure patterns, and emerging threats. Our research reveals alarming gaps and unexpected trends, including the decay of network segmentation, persistent challenges in attack surface management, and an increasing volume of dark matter on modern networks. Get the full report to see what we found!

The State of Asset Security: Uncovering Alarming Gaps & Unexpected Exposures

runZero's research team analyzed tens of millions of data points to understand attack surfaces, exposure patterns, and emerging threats. Our research reveals alarming gaps and unexpected trends, including the decay of network segmentation, persistent challenges in attack surface management, and an increasing volume of dark matter on modern networks. Get the full report to see what we found!
runZero
EDR vs. XDR vs. MDR:The Cybersecurity ABCs Explained

EDR vs. XDR vs. MDR:The Cybersecurity ABCs Explained

When considering SIEM alternatives like EDR, XDR, or MDR, making the right choice can significantly impact your ability to optimize resources and reduce your organization’s exposure to threats. Understanding the differences between these solutions, along with how they compare to traditional SIEM tools, is crucial in selecting the best option for your organization’s unique needs.

EDR vs. XDR vs. MDR:The Cybersecurity ABCs Explained

When considering SIEM alternatives like EDR, XDR, or MDR, making the right choice can significantly impact your ability to optimize resources and reduce your organization’s exposure to threats. Understanding the differences between these solutions, along with how they compare to traditional SIEM tools, is crucial in selecting the best option for your organization’s unique needs.
Adlumin
The Executive's Guide to Cybersecurity

The Executive's Guide to Cybersecurity

This overview guide outlines the current cybersecurity threat landscape and how a security operations platform can help organizations better secure their network while also providing security and IT teams with additional resources. It aims to provide executives with a clear understanding of the platform’s business benefits.

The Executive's Guide to Cybersecurity

This overview guide outlines the current cybersecurity threat landscape and how a security operations platform can help organizations better secure their network while also providing security and IT teams with additional resources. It aims to provide executives with a clear understanding of the platform’s business benefits.
Adlumin
The Ultimate Guide to Using Cybersecurity AI

The Ultimate Guide to Using Cybersecurity AI

Explore the benefits of integrating AI into your strategy and learn how it revolutionizes your Security Operations Center (SOC) across crucial threat detection and response stages. This guide aims to provide valuable insights into responsible AI implementation with Adlumin’s recommendations for a strategic approach to cybersecurity.

The Ultimate Guide to Using Cybersecurity AI

Explore the benefits of integrating AI into your strategy and learn how it revolutionizes your Security Operations Center (SOC) across crucial threat detection and response stages. This guide aims to provide valuable insights into responsible AI implementation with Adlumin’s recommendations for a strategic approach to cybersecurity.
Adlumin
Ultimate Buyer's Guide to Managed Detection and Response

Ultimate Buyer's Guide to Managed Detection and Response

Whether you already have an MDR solution or want to implement one, this guide will walk you through five key steps to navigate the MDR market and find the solution that best suits your organization’s needs.

Ultimate Buyer's Guide to Managed Detection and Response

Whether you already have an MDR solution or want to implement one, this guide will walk you through five key steps to navigate the MDR market and find the solution that best suits your organization’s needs.
Adlumin
Delivering Incident Response Excellence: How Wipro enhances customer services with automated investigation and response.

Delivering Incident Response Excellence: How Wipro enhances customer services with automated investigation and response.

Empowering Wipro’s incident response with forensic-driven automation--Binalyze AIR enables faster, deeper, and more efficient investigations by consolidating critical forensics and incident response workflows into a unified, automated platform. With reduced evidence acquisition times, enhanced collaboration, and unmatched scalability, AIR empowers Wipro to swiftly detect, analyze, and remediate complex threats, ensuring robust protection and proactive resilience for their global customers.

Delivering Incident Response Excellence: How Wipro enhances customer services with automated investigation and response.

Empowering Wipro’s incident response with forensic-driven automation--Binalyze AIR enables faster, deeper, and more efficient investigations by consolidating critical forensics and incident response workflows into a unified, automated platform. With reduced evidence acquisition times, enhanced collaboration, and unmatched scalability, AIR empowers Wipro to swiftly detect, analyze, and remediate complex threats, ensuring robust protection and proactive resilience for their global customers.
Binalyze
From security alert to action: Accelerating incident response with automated investigations

From security alert to action: Accelerating incident response with automated investigations

From alerts to action: Automated investigation and response (AIR) empowers security teams with comprehensive investigation workflows, transforming incident response from reactive steps into proactive, streamlined processes.

From security alert to action: Accelerating incident response with automated investigations

From alerts to action: Automated investigation and response (AIR) empowers security teams with comprehensive investigation workflows, transforming incident response from reactive steps into proactive, streamlined processes.
Binalyze
IDC Analyst Brief: Enhancing Incident Response with Automated Investigation Workflows

IDC Analyst Brief: Enhancing Incident Response with Automated Investigation Workflows

Empower your security teams with forensic-driven automated workflows - Accelerate incident response, enhance investigation speed and accuracy and free up resources to focus on high-priority threats. Revolutionize your approach to security with streamlined investigation automation that shortens response times, empower SOC analysts and strengthens your organization’s resilience against evolving cyber threats.

IDC Analyst Brief: Enhancing Incident Response with Automated Investigation Workflows

Empower your security teams with forensic-driven automated workflows - Accelerate incident response, enhance investigation speed and accuracy and free up resources to focus on high-priority threats. Revolutionize your approach to security with streamlined investigation automation that shortens response times, empower SOC analysts and strengthens your organization’s resilience against evolving cyber threats.
Binalyze
Incident response provider CyberClan eyes significant commercial opportunities to scale thanks to automated investigation and response

Incident response provider CyberClan eyes significant commercial opportunities to scale thanks to automated investigation and response

Transforming digital forensics for rapid incident response-- Automated investigation and response (AIR) capability empowers CyberClan to elevate incident response with 5x faster triage, streamlined evidence acquisition, and deep investigative insights.

Incident response provider CyberClan eyes significant commercial opportunities to scale thanks to automated investigation and response

Transforming digital forensics for rapid incident response-- Automated investigation and response (AIR) capability empowers CyberClan to elevate incident response with 5x faster triage, streamlined evidence acquisition, and deep investigative insights.
Binalyze
The Unreasonable Effectiveness of Inside Out Attack Surface Management

The Unreasonable Effectiveness of Inside Out Attack Surface Management

Wednesday, December 4, 2024 at 1 PM EST

The Unreasonable Effectiveness of Inside Out Attack Surface Management

Wednesday, December 4, 2024 at 1 PM EST
runZero
Cybersecurity Day: How to Automate Security Analytics with AI and ML

Cybersecurity Day: How to Automate Security Analytics with AI and ML

Tuesday, December 17, 2024 at 1 PM EST

Cybersecurity Day: How to Automate Security Analytics with AI and ML

Tuesday, December 17, 2024 at 1 PM EST
Snowflake
Enterprise Key Management Buyer's Guide

Enterprise Key Management Buyer's Guide

Despite what the industry thinks, only a few SSH key management solutions are able to handle modern, distributed digital environments.

Enterprise Key Management Buyer's Guide

Despite what the industry thinks, only a few SSH key management solutions are able to handle modern, distributed digital environments.
SSH
The Future of Cybersecurity is Passwordless and Keyless

The Future of Cybersecurity is Passwordless and Keyless

Passwordless and keyless authentication removes two fundamental sources of risk while making privileged access more streamlined, user-friendly, and cost-effective.

The Future of Cybersecurity is Passwordless and Keyless

Passwordless and keyless authentication removes two fundamental sources of risk while making privileged access more streamlined, user-friendly, and cost-effective.
SSH
Cyber-Physical Solutions for Safer & Smarter Business Growth

Cyber-Physical Solutions for Safer & Smarter Business Growth

Protect your business from cyber and physical threats with integrated security solutions for comprehensive threat management.

Cyber-Physical Solutions for Safer & Smarter Business Growth

Protect your business from cyber and physical threats with integrated security solutions for comprehensive threat management.
Claro Enterprise Solutions
Everything You Can Do to Fight Social Engineering and Phishing

Everything You Can Do to Fight Social Engineering and Phishing

Tuesday, December 3, 2024 at 1PM EST

Everything You Can Do to Fight Social Engineering and Phishing

Tuesday, December 3, 2024 at 1PM EST
Knowbe4
8 Essential Steps to Securing Your NIST AI RMF Implementation

8 Essential Steps to Securing Your NIST AI RMF Implementation

Secure your AI systems with NIST Risk Management Framework essentials for transparency, fairness, and accountability.

8 Essential Steps to Securing Your NIST AI RMF Implementation

Secure your AI systems with NIST Risk Management Framework essentials for transparency, fairness, and accountability.
Scrut Automation
A Practical Guide for Early-Stage CTOs Navigating Cybersecurity

A Practical Guide for Early-Stage CTOs Navigating Cybersecurity

Get strategic insights to strengthen compliance, choose the right vendors, and build a strong cybersecurity foundation.

A Practical Guide for Early-Stage CTOs Navigating Cybersecurity

Get strategic insights to strengthen compliance, choose the right vendors, and build a strong cybersecurity foundation.
Scrut Automation
Building Blocks for Next-Generation Security Operations

Building Blocks for Next-Generation Security Operations

This is an executive summary of the “Building Blocks for Next-Generation Security Operations” webinar that took place October 15th, 2024. The speakers wereJake Williams, VP of R&D, Hunter Strategy, and John Pelton, Sr. Director, Cyber Operations, Optiv. The webinar was moderated by Becky Bracken, editor at Dark Reading.

Building Blocks for Next-Generation Security Operations

This is an executive summary of the “Building Blocks for Next-Generation Security Operations” webinar that took place October 15th, 2024. The speakers wereJake Williams, VP of R&D, Hunter Strategy, and John Pelton, Sr. Director, Cyber Operations, Optiv. The webinar was moderated by Becky Bracken, editor at Dark Reading.
Optiv
Elevate Your Cyber Defense: Real-World Strategies

Elevate Your Cyber Defense: Real-World Strategies

Available On-Demand

Elevate Your Cyber Defense: Real-World Strategies

Available On-Demand
Hitachi Vantara
Splitmetrics Case Study: Market expansion with a security-first approach

Splitmetrics Case Study: Market expansion with a security-first approach

Use this guide to understand and comply with the EU AI Act, leveraging practical tips for securing AI systems.

Splitmetrics Case Study: Market expansion with a security-first approach

Use this guide to understand and comply with the EU AI Act, leveraging practical tips for securing AI systems.
Scrut Automation
The Great AI Regulation Road Trip through ISO 42001, NIST AI, and Beyond

The Great AI Regulation Road Trip through ISO 42001, NIST AI, and Beyond

AI systems that are resilient, compliant, and secure are the need of the hour. Download for more strategic insights.

The Great AI Regulation Road Trip through ISO 42001, NIST AI, and Beyond

AI systems that are resilient, compliant, and secure are the need of the hour. Download for more strategic insights.
Scrut Automation
The Seven Focus Areas Critical to Navigating the EU AI Act

The Seven Focus Areas Critical to Navigating the EU AI Act

Use this guide to understand and comply with the EU AI Act, leveraging practical tips for securing AI systems.

The Seven Focus Areas Critical to Navigating the EU AI Act

Use this guide to understand and comply with the EU AI Act, leveraging practical tips for securing AI systems.
Scrut Automation
Building Blocks for Next-Gen Security Operations

Building Blocks for Next-Gen Security Operations

Security operations are changing quickly. Security tools are evolving and AI is changing how organizations approach security analytics. Faced with an ever-expanding attack surface, increased threats, ever-tightening budgets, and more complex business technology environments, the modern SOC needs to blend human expertise with machine intelligence to be able to respond. Here's what CISOs and SOC managers need to know

Building Blocks for Next-Gen Security Operations

Security operations are changing quickly. Security tools are evolving and AI is changing how organizations approach security analytics. Faced with an ever-expanding attack surface, increased threats, ever-tightening budgets, and more complex business technology environments, the modern SOC needs to blend human expertise with machine intelligence to be able to respond. Here's what CISOs and SOC managers need to know
Optiv
Quantum next: Navigating a new cyber threat  landscape

Quantum next: Navigating a new cyber threat landscape

Assessing, preparing and proving technological and regulatory readiness to handle cyber attacks can be critical in a postquantum computing world.

Quantum next: Navigating a new cyber threat landscape

Assessing, preparing and proving technological and regulatory readiness to handle cyber attacks can be critical in a postquantum computing world.
PwC
Software Supply Chain State of the Union 2024

Software Supply Chain State of the Union 2024

From Innovation to Infiltration: Safeguarding Against the Hidden Dangers in Your Software Ecosystem

Software Supply Chain State of the Union 2024

From Innovation to Infiltration: Safeguarding Against the Hidden Dangers in Your Software Ecosystem
JFrog
Combat Session Hijacking and Credential Theft with Huntress MDR for Microsoft 365

Combat Session Hijacking and Credential Theft with Huntress MDR for Microsoft 365

Available On-Demand

Combat Session Hijacking and Credential Theft with Huntress MDR for Microsoft 365

Available On-Demand
Huntress
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.