Cybersecurity Resource Library

The #1 source for free Cybersecurity reports, whitepapers, webinars, research and more.

Showing results 301 - 330 of 995
Showing results 301 - 330 of 995

Filter by

Filters

EDR Made Better. XDR Made Easy

EDR Made Better. XDR Made Easy

EDR Made Better. XDR Made Easy

EDR Made Better. XDR Made Easy

EDR Made Better. XDR Made Easy
VMware
Redefining the Security Analyst Experience: EDR to XDR

Redefining the Security Analyst Experience: EDR to XDR

Redefining the Security Analyst Experience: EDR to XDR

Redefining the Security Analyst Experience: EDR to XDR

Redefining the Security Analyst Experience: EDR to XDR
VMware
VMware Carbon Black XDR

VMware Carbon Black XDR

VMware Carbon Black XDR

VMware Carbon Black XDR

VMware Carbon Black XDR
VMware
API Security: Protecting Your Application's Attack Surface

API Security: Protecting Your Application's Attack Surface

| Live Webinar | Thursday, February 29, 2024 | 1pm ET |

API Security: Protecting Your Application's Attack Surface

| Live Webinar | Thursday, February 29, 2024 | 1pm ET |
Apiiro
App Control For Dummies

App Control For Dummies

App Control for Dummies

App Control For Dummies

App Control for Dummies
VMware
Carbon Black Named XDR Leader by Frost & Sullivan

Carbon Black Named XDR Leader by Frost & Sullivan

Frost & Sullivan Report - XDR

Carbon Black Named XDR Leader by Frost & Sullivan

Frost & Sullivan Report - XDR
VMware
Six Benefits of App Control

Six Benefits of App Control

Six Benefits of App Control

Six Benefits of App Control

Six Benefits of App Control
VMware
Six Benefits of App Control Finserv

Six Benefits of App Control Finserv

Six Benefits of App Control Finserv

Six Benefits of App Control Finserv

Six Benefits of App Control Finserv
VMware
How Top Cybersecurity Experts Predict Threats and Navigate Risk

How Top Cybersecurity Experts Predict Threats and Navigate Risk

Available On-Demand

How Top Cybersecurity Experts Predict Threats and Navigate Risk

Available On-Demand
Rubrik
Endpoint Best Practices to Block Ransomware

Endpoint Best Practices to Block Ransomware

Practical guidance on configuring your endpoint solution to provide optimum protection

Endpoint Best Practices to Block Ransomware

Practical guidance on configuring your endpoint solution to provide optimum protection
Sophos Inc.
Incident Response Planning Guide

Incident Response Planning Guide

Discover the latest cybersecurity landscape and how you can reduce cyber risk, increase efficiency and impact of security investments, and improve insurability with MDR.

Incident Response Planning Guide

Discover the latest cybersecurity landscape and how you can reduce cyber risk, increase efficiency and impact of security investments, and improve insurability with MDR.
Sophos Inc.
Stopping Active Adversaries: Lessons from the Cyber Frontline

Stopping Active Adversaries: Lessons from the Cyber Frontline

Get key learnings and actionable insights for your security strategy based on 232 major cyber incidents remediated by Sophos X-Ops incident response.

Stopping Active Adversaries: Lessons from the Cyber Frontline

Get key learnings and actionable insights for your security strategy based on 232 major cyber incidents remediated by Sophos X-Ops incident response.
Sophos Inc.
Strengthen Microsoft Defender with MDR

Strengthen Microsoft Defender with MDR

Stopping advanced ransomware attacks and breaches with Microsoft Defender requires 24/7 human-led detection and response. Find out how your organization can benefit with MDR today.

Strengthen Microsoft Defender with MDR

Stopping advanced ransomware attacks and breaches with Microsoft Defender requires 24/7 human-led detection and response. Find out how your organization can benefit with MDR today.
Sophos Inc.
Top Cloud Security Threats Targeting Today's Enterprises

Top Cloud Security Threats Targeting Today's Enterprises

| Live Webinar | Thursday, February 8, 2024 | 1pm ET |

Top Cloud Security Threats Targeting Today's Enterprises

| Live Webinar | Thursday, February 8, 2024 | 1pm ET |
Darktrace
Winter 2024 G2 Grid Report: Best IT Risk Management Software

Winter 2024 G2 Grid Report: Best IT Risk Management Software

Not all IT Risk Management Software solutions are created equal.

Winter 2024 G2 Grid Report: Best IT Risk Management Software

Not all IT Risk Management Software solutions are created equal.
AuditBoard
Winter 2024 G2 Grid Report: Best Third Party & Supplier Risk Management Software

Winter 2024 G2 Grid Report: Best Third Party & Supplier Risk Management Software

Not all Third Party Risk Management Software solutions are created equal.

Winter 2024 G2 Grid Report: Best Third Party & Supplier Risk Management Software

Not all Third Party Risk Management Software solutions are created equal.
AuditBoard
How Enterprise Are Responding to the Incident Response Challenge

How Enterprise Are Responding to the Incident Response Challenge

Many organizations bolstered their incident response capabilities last year to address a wide and growing range of security threats to their IT environments. The efforts drove an increase in the number of organizations that have an established security operations center, dedicated security staff, and full-fledged incident response teams. Many have established security operations centers and have a dedicated incident response team to address a continuing increase in reported security incidents.

How Enterprise Are Responding to the Incident Response Challenge

Many organizations bolstered their incident response capabilities last year to address a wide and growing range of security threats to their IT environments. The efforts drove an increase in the number of organizations that have an established security operations center, dedicated security staff, and full-fledged incident response teams. Many have established security operations centers and have a dedicated incident response team to address a continuing increase in reported security incidents.
Dark Reading
How Enterprises Assess Their Cyber-Risk

How Enterprises Assess Their Cyber-Risk

Organizations have deployed an array of controls for managing cyber-risks as they deal with a complex landscape of threats.  While cloud and remote workforce issues dominate the  agenda, these are just two of the ever-increasing number of  cyber-risks at modern enterprise organizations

How Enterprises Assess Their Cyber-Risk

Organizations have deployed an array of controls for managing cyber-risks as they deal with a complex landscape of threats.  While cloud and remote workforce issues dominate the  agenda, these are just two of the ever-increasing number of  cyber-risks at modern enterprise organizations
Orca
Industrial Networks in the Age of Digitalization

Industrial Networks in the Age of Digitalization

Now more than ever, increasingly connected operational technology (OT) networks face real cyber threats -- and a generation of new industrial control system (ICS)/OT security products and services aims to fill the security gaps.

Industrial Networks in the Age of Digitalization

Now more than ever, increasingly connected operational technology (OT) networks face real cyber threats -- and a generation of new industrial control system (ICS)/OT security products and services aims to fill the security gaps.
Dark Reading
Zero-Trust Adoption Driven by Data Protection, Cloud Access Control, and Regulatory Compliance Requirements

Zero-Trust Adoption Driven by Data Protection, Cloud Access Control, and Regulatory Compliance Requirements

Zero-trust initiatives are a key focus for many companies. Nearly 30% of organizations are already rolling out zero-trust initiatives to control access to their data and assets and more than 80% will have the capability within the next 18 months. Organizations are addressing cybersecurity challenges by enhancing identity and access management, privileged-access management, and data classification. They expect to see budgets for zero-trust initiatives grow modestly over the next 12 months.

Zero-Trust Adoption Driven by Data Protection, Cloud Access Control, and Regulatory Compliance Requirements

Zero-trust initiatives are a key focus for many companies. Nearly 30% of organizations are already rolling out zero-trust initiatives to control access to their data and assets and more than 80% will have the capability within the next 18 months. Organizations are addressing cybersecurity challenges by enhancing identity and access management, privileged-access management, and data classification. They expect to see budgets for zero-trust initiatives grow modestly over the next 12 months.
Dark Reading
Arctic Wolf Labs' 2024 Cybersecurity Predictions

Arctic Wolf Labs' 2024 Cybersecurity Predictions

As we look towards 2024, we know that threat actors will continue to refine their techniques. Use this report, and the predictions and recommendations within, to help secure your organization against these growing and evolving threats.

Arctic Wolf Labs' 2024 Cybersecurity Predictions

As we look towards 2024, we know that threat actors will continue to refine their techniques. Use this report, and the predictions and recommendations within, to help secure your organization against these growing and evolving threats.
Arctic Wolf
DevSecOps: The Smart Way to Shift Left

DevSecOps: The Smart Way to Shift Left

| Live Webinar | Wednesday, February 14, 2024 | 1pm ET |

DevSecOps: The Smart Way to Shift Left

| Live Webinar | Wednesday, February 14, 2024 | 1pm ET |
Palo Alto Networks
The Big Business Of Cybercrime: A Deep Dive Guide

The Big Business Of Cybercrime: A Deep Dive Guide

Cybercrime has become a big business -- an entire ecosystem of organizations run just like yours. This report seeks to enlighten your understanding of cybercrime, including the vast ramifications it entails for your business now and in the future.

The Big Business Of Cybercrime: A Deep Dive Guide

Cybercrime has become a big business -- an entire ecosystem of organizations run just like yours. This report seeks to enlighten your understanding of cybercrime, including the vast ramifications it entails for your business now and in the future.
Arctic Wolf
The Human - AI Partnership

The Human - AI Partnership

What does the future hold for AI? See our full report for our insights, predictions, and what 800+ industry leaders think will happen next and how emerging technology may empower the next generation of security operations.

The Human - AI Partnership

What does the future hold for AI? See our full report for our insights, predictions, and what 800+ industry leaders think will happen next and how emerging technology may empower the next generation of security operations.
Arctic Wolf
SecOps and DevSecOps in the Cloud

SecOps and DevSecOps in the Cloud

This is an executive summary of the "SecOps & DevSecOps in the Cloud" webinar that took place December 14th, 2023. The speakers were Dr. Jason Clark, independent security researcher, and Charles Goldberg, Sr. Director, Product Marketing at Palo Alto Networks. The webinar was moderated by Becky Bracken, editor at Dark Reading.

SecOps and DevSecOps in the Cloud

This is an executive summary of the "SecOps & DevSecOps in the Cloud" webinar that took place December 14th, 2023. The speakers were Dr. Jason Clark, independent security researcher, and Charles Goldberg, Sr. Director, Product Marketing at Palo Alto Networks. The webinar was moderated by Becky Bracken, editor at Dark Reading.
Palo Alto Networks
Tips for Managing Cloud Security in a Hybrid Environment

Tips for Managing Cloud Security in a Hybrid Environment

| Live Webinar | Thursday, February 1, 2024 | 1pm ET |

Tips for Managing Cloud Security in a Hybrid Environment

| Live Webinar | Thursday, February 1, 2024 | 1pm ET |
Wiz
The InfoSec Survival Guide

The InfoSec Survival Guide

Today, security and compliance leaders are struggling under the pressure of maintaining ongoing compliance in the face of regulatory expansion, changing requirements, technical transformation, explosions of scale (data, users, assets), and the battle for talent. In the face of these encroaching demands, InfoSec professionals are in dire need of a new approach to compliance.

The InfoSec Survival Guide

Today, security and compliance leaders are struggling under the pressure of maintaining ongoing compliance in the face of regulatory expansion, changing requirements, technical transformation, explosions of scale (data, users, assets), and the battle for talent. In the face of these encroaching demands, InfoSec professionals are in dire need of a new approach to compliance.
AuditBoard
Threat Intelligence: Eyes on the Enemy

Threat Intelligence: Eyes on the Enemy

Threat intelligence is the gold standard for 21st-century cybersecurity. However, today's IT teams are overwhelmed by phishing scams, social engineering hacks, failures in managing third-party risks, and more. New research from CyberRisk Alliance and sponsored by AuditBoard, Threat Intelligence: Eyes on the Enemy examines critical steps for all organizations to equip themselves to handle the next generation of threats.

Threat Intelligence: Eyes on the Enemy

Threat intelligence is the gold standard for 21st-century cybersecurity. However, today's IT teams are overwhelmed by phishing scams, social engineering hacks, failures in managing third-party risks, and more. New research from CyberRisk Alliance and sponsored by AuditBoard, Threat Intelligence: Eyes on the Enemy examines critical steps for all organizations to equip themselves to handle the next generation of threats.
AuditBoard
Your Complete Guide to the New SEC Cybersecurity Rules

Your Complete Guide to the New SEC Cybersecurity Rules

In an effort to address the rise in cyber breaches, the U.S. Securities and Exchange Commission has released new cybersecurity disclosure requirements for public companies. Get a comprehensive guide to help you navigate the new rules, including key dates, an overview of the requirements, and steps to prepare.

Your Complete Guide to the New SEC Cybersecurity Rules

In an effort to address the rise in cyber breaches, the U.S. Securities and Exchange Commission has released new cybersecurity disclosure requirements for public companies. Get a comprehensive guide to help you navigate the new rules, including key dates, an overview of the requirements, and steps to prepare.
AuditBoard
Cybersecurity Isn't Enough

Cybersecurity Isn't Enough

Cybersecurity Isn’t Enough - The Information Security Ecosystem Dies Without External Data Privacy

Cybersecurity Isn't Enough

Cybersecurity Isn’t Enough - The Information Security Ecosystem Dies Without External Data Privacy
Privacy Bee
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.