Cybersecurity Resource Library

The #1 source for free Cybersecurity reports, whitepapers, webinars, research and more.

Showing results 331 - 360 of 995
Showing results 331 - 360 of 995

Filter by

Filters

Mitigating Exposed PII

Mitigating Exposed PII

Mitigating Exposed PII Dramatically Lowers Risk of Data Breach via Social Engineering

Mitigating Exposed PII

Mitigating Exposed PII Dramatically Lowers Risk of Data Breach via Social Engineering
Privacy Bee
Where Data Privacy And Cybersecurity Intersect

Where Data Privacy And Cybersecurity Intersect

Where Data Privacy and Cybersecurity Intersect (and Don’t)

Where Data Privacy And Cybersecurity Intersect

Where Data Privacy and Cybersecurity Intersect (and Don’t)
Privacy Bee
Arctic Wolf Labs' 2024 Cybersecurity Predictions

Arctic Wolf Labs' 2024 Cybersecurity Predictions

As we look towards 2024, we know that threat actors will continue to refine their techniques. Use this report, and the predictions and recommendations within, to help secure your organization against these growing and evolving threats.

Arctic Wolf Labs' 2024 Cybersecurity Predictions

As we look towards 2024, we know that threat actors will continue to refine their techniques. Use this report, and the predictions and recommendations within, to help secure your organization against these growing and evolving threats.
Arctic Wolf
The Big Business Of Cybercrime: A Deep Dive Guide

The Big Business Of Cybercrime: A Deep Dive Guide

Cybercrime has become a big business -- an entire ecosystem of organizations run just like yours. This report seeks to enlighten your understanding of cybercrime, including the vast ramifications it entails for your business now and in the future.

The Big Business Of Cybercrime: A Deep Dive Guide

Cybercrime has become a big business -- an entire ecosystem of organizations run just like yours. This report seeks to enlighten your understanding of cybercrime, including the vast ramifications it entails for your business now and in the future.
Arctic Wolf
The Human - AI Partnership

The Human - AI Partnership

What does the future hold for AI? See our full report for our insights, predictions, and what 800+ industry leaders think will happen next and how emerging technology may empower the next generation of security operations.

The Human - AI Partnership

What does the future hold for AI? See our full report for our insights, predictions, and what 800+ industry leaders think will happen next and how emerging technology may empower the next generation of security operations.
Arctic Wolf
The Keys to Successfully Securing Cloud-Native Environments

The Keys to Successfully Securing Cloud-Native Environments

As the use of cloud computing rises, so does the complexity of these environments and the volume of attacks targeting cloud systems. As the ability to spin up infrastructure becomes more decentralized, a new generation of vulnerabilities and risks are created in misdelivery, misconfiguration, and publishing errors. This is the world enterprise security teams find themselves as they work to secure their cloud systems. Here is how to secure cloud-native systems and development pipelines.

The Keys to Successfully Securing Cloud-Native Environments

As the use of cloud computing rises, so does the complexity of these environments and the volume of attacks targeting cloud systems. As the ability to spin up infrastructure becomes more decentralized, a new generation of vulnerabilities and risks are created in misdelivery, misconfiguration, and publishing errors. This is the world enterprise security teams find themselves as they work to secure their cloud systems. Here is how to secure cloud-native systems and development pipelines.
Palo Alto Networks
Elevating Your Data Security Game: Strengthening Your Security Posture Against Cyber Threats

Elevating Your Data Security Game: Strengthening Your Security Posture Against Cyber Threats

Available On-Demand

Elevating Your Data Security Game: Strengthening Your Security Posture Against Cyber Threats

Available On-Demand
Rubrik
The State of Generative AI in the Enterprise

The State of Generative AI in the Enterprise

With the sudden increase in organizations embracing generative AI tools, cybersecurity professionals are employing multiple strategies to mitigate risks to privacy, security, and regulatory compliance issues.

The State of Generative AI in the Enterprise

With the sudden increase in organizations embracing generative AI tools, cybersecurity professionals are employing multiple strategies to mitigate risks to privacy, security, and regulatory compliance issues.
Blink Ops
Finding Issues that Matter in Open Source Dependencies and Fixing them Without Developer Friction

Finding Issues that Matter in Open Source Dependencies and Fixing them Without Developer Friction

Available On-Demand

Finding Issues that Matter in Open Source Dependencies and Fixing them Without Developer Friction

Available On-Demand
Semgrep
Gartner Critical Capabilities for Application Security Testing 2023

Gartner Critical Capabilities for Application Security Testing 2023

Arm Yourself with the 2023 Critical Capabilities for Application Security Testing

Gartner Critical Capabilities for Application Security Testing 2023

Arm Yourself with the 2023 Critical Capabilities for Application Security Testing
OpenText
Gartner Magic Quadrant for Application Security Testing 2023

Gartner Magic Quadrant for Application Security Testing 2023

Defend Your Applications: Insights from the 2023 Gartner Magic Quadrant for Application Security Testing

Gartner Magic Quadrant for Application Security Testing 2023

Defend Your Applications: Insights from the 2023 Gartner Magic Quadrant for Application Security Testing
OpenText
Increase Speed and Accuracy with AI Driven Static Analysis Auditing

Increase Speed and Accuracy with AI Driven Static Analysis Auditing

Leverage millions of past audit decisions to power AI assisted auditing

Increase Speed and Accuracy with AI Driven Static Analysis Auditing

Leverage millions of past audit decisions to power AI assisted auditing
OpenText
The Developers Guide to API Security

The Developers Guide to API Security

Learn how to defend against the ten most common and serious API security risks

The Developers Guide to API Security

Learn how to defend against the ten most common and serious API security risks
OpenText
The Need for a Software Bill of Materials

The Need for a Software Bill of Materials

Understand the health and security of your software dependencies

The Need for a Software Bill of Materials

Understand the health and security of your software dependencies
OpenText
The State of Code Security Report 2023

The State of Code Security Report 2023

Go prepared into the new year with The State of Code Security Report

The State of Code Security Report 2023

Go prepared into the new year with The State of Code Security Report
OpenText
2024 API Security Trends & Predictions: A Cloudflare discussion featuring Melinda Marks, ESG Senior Analyst

2024 API Security Trends & Predictions: A Cloudflare discussion featuring Melinda Marks, ESG Senior Analyst

| On-Demand | Wednesday, January 10, 2024 | 1pm ET |

2024 API Security Trends & Predictions: A Cloudflare discussion featuring Melinda Marks, ESG Senior Analyst

| On-Demand | Wednesday, January 10, 2024 | 1pm ET |
Cloudflare
The State of Vulnerability

The State of Vulnerability

While many organizations today run either formal or informal vulnerability management programs, they struggle to patch and mitigate most discovered bugs due to budget and staffing constraints.

The State of Vulnerability

While many organizations today run either formal or informal vulnerability management programs, they struggle to patch and mitigate most discovered bugs due to budget and staffing constraints.
JFrog
2023 Cloud Vulnerability Report

2023 Cloud Vulnerability Report

A comprehensive report on vulnerabilities in cloud environments

2023 Cloud Vulnerability Report

A comprehensive report on vulnerabilities in cloud environments
Wiz
FrostRadar™: Cloud-Native Application Protection Platforms, 2023

FrostRadar™: Cloud-Native Application Protection Platforms, 2023

A Benchmarking System to Spark Companies to Action-Innovation That Fuels New Deal Flowand Growth Pipelines

FrostRadar™: Cloud-Native Application Protection Platforms, 2023

A Benchmarking System to Spark Companies to Action-Innovation That Fuels New Deal Flowand Growth Pipelines
Wiz
How to Fortify OT Environments: Protecting Third-Party Remote Access

How to Fortify OT Environments: Protecting Third-Party Remote Access

In today's interconnected world, remote access to OT systems is crucial for efficiency, but it also presents security challenges that must be addressed

How to Fortify OT Environments: Protecting Third-Party Remote Access

In today's interconnected world, remote access to OT systems is crucial for efficiency, but it also presents security challenges that must be addressed
WALLIX
Wiz for Cloud Security Posture Management

Wiz for Cloud Security Posture Management

Why organizations need a CSPM

Wiz for Cloud Security Posture Management

Why organizations need a CSPM
Wiz
ASPM Checklist

ASPM Checklist

Application security posture management (ASPM) is taking the AppSec space by storm. Get a primer on ASPM solutions with this overview and checklist.

ASPM Checklist

Application security posture management (ASPM) is taking the AppSec space by storm. Get a primer on ASPM solutions with this overview and checklist.
Apiiro
Using Threat Intelligence to Transform Security Programs

Using Threat Intelligence to Transform Security Programs

Building a modern and effective cybersecurity team today means efficiently sharing cybersecurity intelligence. Cyber threat intelligence helps organizations maximize their digital defenses, respond better when attacks do occur, and even inform how to improve the overall security program. In years past, the challenge was finding threat intelligence. Now, it is finding useful signals in the data. Here’s how to get started.

Using Threat Intelligence to Transform Security Programs

Building a modern and effective cybersecurity team today means efficiently sharing cybersecurity intelligence. Cyber threat intelligence helps organizations maximize their digital defenses, respond better when attacks do occur, and even inform how to improve the overall security program. In years past, the challenge was finding threat intelligence. Now, it is finding useful signals in the data. Here’s how to get started.
Google Cloud
XBOM Checklist

XBOM Checklist

What is your SBOM missing? Download Apiiro's XBOM checklist to learn the 16 things you get with an eXtended Software Bill of materials that you don’t with SBOM.

XBOM Checklist

What is your SBOM missing? Download Apiiro's XBOM checklist to learn the 16 things you get with an eXtended Software Bill of materials that you don’t with SBOM.
Apiiro
Enterprise IoT and OT: 2023 Trends and Threats

Enterprise IoT and OT: 2023 Trends and Threats

IoT and OT are growing targets for cyberattacks. Watch this webinar to uncover the latest trends and threats.

Enterprise IoT and OT: 2023 Trends and Threats

IoT and OT are growing targets for cyberattacks. Watch this webinar to uncover the latest trends and threats.
Zscaler
Key Elements Enterprises Need to Include in Modern SecOps

Key Elements Enterprises Need to Include in Modern SecOps

Security teams are overhwlemed in the operations center. As the enterprise's first line of defense against an active attack, the security operatoins center sifts through theat intelligence, events data, logs, and activity reports from throughout the enterprise and key partners. How can CISOs give the SOC the necessary tools to effectively manage the systems and data? What will it take to unlock effective threat detection and master data collection and response for modern defense?

Key Elements Enterprises Need to Include in Modern SecOps

Security teams are overhwlemed in the operations center. As the enterprise's first line of defense against an active attack, the security operatoins center sifts through theat intelligence, events data, logs, and activity reports from throughout the enterprise and key partners. How can CISOs give the SOC the necessary tools to effectively manage the systems and data? What will it take to unlock effective threat detection and master data collection and response for modern defense?
Google Cloud
What's In Your Cloud?

What's In Your Cloud?

| Live Webinar | Wednesday, January 17, 2024 | 1pm ET |

What's In Your Cloud?

| Live Webinar | Wednesday, January 17, 2024 | 1pm ET |
Prisma Cloud by Palo Alto Networks
Everything You Need to Know About DNS Attacks

Everything You Need to Know About DNS Attacks

| Live Webinar | Thursday, January 18, 2024 | 1pm ET |

Everything You Need to Know About DNS Attacks

| Live Webinar | Thursday, January 18, 2024 | 1pm ET |
Infoblox
DNS Encryption For CPE-based Security

DNS Encryption For CPE-based Security

Security providers face the challenge of dealing with encrypted DNS when filtering content on CPE. This can be solved by handling all DNS requests on the router. Learn more about enabling CPE-based security solutions for encrypted DNS.

DNS Encryption For CPE-based Security

Security providers face the challenge of dealing with encrypted DNS when filtering content on CPE. This can be solved by handling all DNS requests on the router. Learn more about enabling CPE-based security solutions for encrypted DNS.
PowerDNS
Network-based security with DNS

Network-based security with DNS

The growth in both internet traffic and the number of connected devices is expected to continue to increase rapidly over the coming years. This, coupled with an increased dependency on online tools, conferencing services, and the use of IoT devices, creates a very attractive situation for malicious activities.

Network-based security with DNS

The growth in both internet traffic and the number of connected devices is expected to continue to increase rapidly over the coming years. This, coupled with an increased dependency on online tools, conferencing services, and the use of IoT devices, creates a very attractive situation for malicious activities.
PowerDNS
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.