Cybersecurity Resource Library

The #1 source for free Cybersecurity reports, whitepapers, webinars, research and more.

Showing results 421 - 450 of 995
Showing results 421 - 450 of 995

Filter by

Filters

Fortinet Named a Leader in the Forrester Wave�: Zero Trust Edge (ZTE) Solutions

Fortinet Named a Leader in the Forrester Wave�: Zero Trust Edge (ZTE) Solutions

Fortinet has been named as a Leader in the Forrester Wave™: Zero Trust Edge (ZTE) solutions, Q3 2023 report. The Fortinet SASE solution uniquely brings together all components needed to converge networking and security and can be deployed on premises and in the cloud for consistent convergence and zero implicit trust everywhere.

Fortinet Named a Leader in the Forrester Wave�: Zero Trust Edge (ZTE) Solutions

Fortinet has been named as a Leader in the Forrester Wave™: Zero Trust Edge (ZTE) solutions, Q3 2023 report. The Fortinet SASE solution uniquely brings together all components needed to converge networking and security and can be deployed on premises and in the cloud for consistent convergence and zero implicit trust everywhere.
Fortinet
FortiSASE Customer Success Stories - The Benefits of Single Vendor SASE

FortiSASE Customer Success Stories - The Benefits of Single Vendor SASE

This ebook details how organizations that deploy Fortinet SASE are getting better business outcomes and enhanced user experiences. Fortinet SASE advantages include consistent cybersecurity for work-from-anywhere users and a unified agent that supports multiple use cases.

FortiSASE Customer Success Stories - The Benefits of Single Vendor SASE

This ebook details how organizations that deploy Fortinet SASE are getting better business outcomes and enhanced user experiences. Fortinet SASE advantages include consistent cybersecurity for work-from-anywhere users and a unified agent that supports multiple use cases.
Fortinet
Single-Vendor SASE For Dummies - The Fortinet Special Edition

Single-Vendor SASE For Dummies - The Fortinet Special Edition

This easy-to-read, easy-to-understand ebook consists of six engaging and enlightening sections. Each chapter is written as a standalone piece to help you better understand SASE solutions, so skip ahead or read out of order.

Single-Vendor SASE For Dummies - The Fortinet Special Edition

This easy-to-read, easy-to-understand ebook consists of six engaging and enlightening sections. Each chapter is written as a standalone piece to help you better understand SASE solutions, so skip ahead or read out of order.
Fortinet
When Tech Converges, Orgs Consolidate: Navigating Change Across your Security Platforms

When Tech Converges, Orgs Consolidate: Navigating Change Across your Security Platforms

| On-Demand | Tuesday, October 24, 2023 | 1pm ET |

When Tech Converges, Orgs Consolidate: Navigating Change Across your Security Platforms

| On-Demand | Tuesday, October 24, 2023 | 1pm ET |
Cloudflare
Zero Trust Access For Dummies, 2nd Fortinet Special Edition

Zero Trust Access For Dummies, 2nd Fortinet Special Edition

Thanks to changing business operations--like remote work and digital transformation--the traditional network perimeter is disappearing. As a result, your approach to security needs to shift as well, and implementing a Zero Trust Access (ZTA) strategy is a great place to start.

Zero Trust Access For Dummies, 2nd Fortinet Special Edition

Thanks to changing business operations--like remote work and digital transformation--the traditional network perimeter is disappearing. As a result, your approach to security needs to shift as well, and implementing a Zero Trust Access (ZTA) strategy is a great place to start.
Fortinet
IDC Spotlight Paper: Transforming Data Security and Collaboration with Searchable Encryption

IDC Spotlight Paper: Transforming Data Security and Collaboration with Searchable Encryption

Digital transformation has made data more portable and usable by every part of the business, while also leaving it more exposed. Searchable encryption offers a powerful way to keep data secure and private while unlocking its value. Read the full IDC Spotlight Report to learn more about searchable encryption.

IDC Spotlight Paper: Transforming Data Security and Collaboration with Searchable Encryption

Digital transformation has made data more portable and usable by every part of the business, while also leaving it more exposed. Searchable encryption offers a powerful way to keep data secure and private while unlocking its value. Read the full IDC Spotlight Report to learn more about searchable encryption.
Paperclip Inc.
Paperclip SAFE Zero Trust Architecture Whitepaper

Paperclip SAFE Zero Trust Architecture Whitepaper

Zero Trust Architecture (ZTA) is a widely-used cybersecurity model that can improve your security posture, based on the core tenet of “never trust, always verify.” Paperclip SAFE® enables effective implementation of a ZTA through its process-based micro-segmentation secure storage system. With its ability to enforce granular segmentation, SAFE® supports the realization of ZTA initiatives. Learn more about ZTA and searchable encryption in this whitepaper.

Paperclip SAFE Zero Trust Architecture Whitepaper

Zero Trust Architecture (ZTA) is a widely-used cybersecurity model that can improve your security posture, based on the core tenet of “never trust, always verify.” Paperclip SAFE® enables effective implementation of a ZTA through its process-based micro-segmentation secure storage system. With its ability to enforce granular segmentation, SAFE® supports the realization of ZTA initiatives. Learn more about ZTA and searchable encryption in this whitepaper.
Paperclip Inc.
Paperclip SAFE: Protect and Secure Your Data

Paperclip SAFE: Protect and Secure Your Data

Cybersecurity and data privacy are under assault--and the hackers are winning to the tune of nearly $5B annually. Perimeter security alone does not protect the most valuable asset of any company--its data. This is where SAFE®, a patented searchable encryption solution developed by Paperclip, offers protection through the use of secure Application Program Interface (API) Encryption, Zero Trust Security, and Shredded Data Security.

Paperclip SAFE: Protect and Secure Your Data

Cybersecurity and data privacy are under assault--and the hackers are winning to the tune of nearly $5B annually. Perimeter security alone does not protect the most valuable asset of any company--its data. This is where SAFE®, a patented searchable encryption solution developed by Paperclip, offers protection through the use of secure Application Program Interface (API) Encryption, Zero Trust Security, and Shredded Data Security.
Paperclip Inc.
The Enterprise View to Cloud Security

The Enterprise View to Cloud Security

| On-Demand| Tuesday, October 17, 2023 | 1pm ET |

The Enterprise View to Cloud Security

| On-Demand| Tuesday, October 17, 2023 | 1pm ET |
Wiz
A Short Primer on Container Scanning

A Short Primer on Container Scanning

Container technologies such as Docker and Kubernetes are a foundation of modern DevOps processes. While container technology offers many benefits, there are several risks associated with their adoption.

A Short Primer on Container Scanning

Container technologies such as Docker and Kubernetes are a foundation of modern DevOps processes. While container technology offers many benefits, there are several risks associated with their adoption.
Panoptica
Cisco Panoptica for Simplified Cloud-Native Application Security

Cisco Panoptica for Simplified Cloud-Native Application Security

Cloud-native technologies are reinforcing their core business value into becoming even more critical to the digital economy.

Cisco Panoptica for Simplified Cloud-Native Application Security

Cloud-native technologies are reinforcing their core business value into becoming even more critical to the digital economy.
Panoptica
DevSecOps for Mobile App Development

DevSecOps for Mobile App Development

| On-Demand | Thursday, October 19, 2023 | 1pm ET |

DevSecOps for Mobile App Development

| On-Demand | Thursday, October 19, 2023 | 1pm ET |
Security Innovation
ESG E-Book: Taking a Holistic Approach to Securing Cloud-Native Application Development

ESG E-Book: Taking a Holistic Approach to Securing Cloud-Native Application Development

Organizations are faced with a new equation that includes numerous multipliers of application complexity.

ESG E-Book: Taking a Holistic Approach to Securing Cloud-Native Application Development

Organizations are faced with a new equation that includes numerous multipliers of application complexity.
Panoptica
Fundamentals of a Cyber Risk Assessment

Fundamentals of a Cyber Risk Assessment

| On-Demand| Wednesday, October 18, 2023 | 1pm ET |

Fundamentals of a Cyber Risk Assessment

| On-Demand| Wednesday, October 18, 2023 | 1pm ET |
Hyperproof
The Cloud Threat Landscape: Security learnings from analyzing 500+ cloud environments

The Cloud Threat Landscape: Security learnings from analyzing 500+ cloud environments

The cloud security threat landscape is constantly evolving, and organizations are facing new and sophisticated threats.

The Cloud Threat Landscape: Security learnings from analyzing 500+ cloud environments

The cloud security threat landscape is constantly evolving, and organizations are facing new and sophisticated threats.
Panoptica
The Future of Cloud Security: Attack Paths & Graph-based Technology

The Future of Cloud Security: Attack Paths & Graph-based Technology

This whitepaper delves into the power of leveraging graph-based cloud security technology to improve their cloud security teams’ ability to navigate and assess critical risks in multi-cloud environments.

The Future of Cloud Security: Attack Paths & Graph-based Technology

This whitepaper delves into the power of leveraging graph-based cloud security technology to improve their cloud security teams’ ability to navigate and assess critical risks in multi-cloud environments.
Panoptica
12-step ransomware response plan

12-step ransomware response plan

Ransomware has quickly become the top choice for cybercriminals to extort businesses. As a result, the average cost of a data breach is expected to reach $5 million per incident in 2023.

12-step ransomware response plan

Ransomware has quickly become the top choice for cybercriminals to extort businesses. As a result, the average cost of a data breach is expected to reach $5 million per incident in 2023.
Acronis
CyberThreats Report

CyberThreats Report

We are excited to share with you our latest report, the Acronis Mid-Year Cyberthreats Report 2023.

CyberThreats Report

We are excited to share with you our latest report, the Acronis Mid-Year Cyberthreats Report 2023.
Acronis
Defend your business from ransomware with an enhanced incident response plan' On-demand Virtual Workshop.

Defend your business from ransomware with an enhanced incident response plan' On-demand Virtual Workshop.

As stated in Acronis' Mid-Year Cyberthreats Report for 2023, there were a total of 809 ransomware cases publicly reported in the first quarter of 2023. Notably, March experienced a significant increase of 62% compared to the monthly average of 270 cases. In April, 308 cases were recorded, followed by 259 cases in May.2022 saw a 13% increase in ransomware breaches -- more than the last five years combined.

Defend your business from ransomware with an enhanced incident response plan' On-demand Virtual Workshop.

As stated in Acronis' Mid-Year Cyberthreats Report for 2023, there were a total of 809 ransomware cases publicly reported in the first quarter of 2023. Notably, March experienced a significant increase of 62% compared to the monthly average of 270 cases. In April, 308 cases were recorded, followed by 259 cases in May.2022 saw a 13% increase in ransomware breaches -- more than the last five years combined.
Acronis
Info-Tech Report

Info-Tech Report

In 2022, over 30% of organizations worldwide experienced a ransomware attack. This year, ransomware continues to pose a significant risk to businesses of all sizes.

Info-Tech Report

In 2022, over 30% of organizations worldwide experienced a ransomware attack. This year, ransomware continues to pose a significant risk to businesses of all sizes.
Acronis
The Secrets to Azure and Microsoft 365 Data Resilience

The Secrets to Azure and Microsoft 365 Data Resilience

Available On-Demand

The Secrets to Azure and Microsoft 365 Data Resilience

Available On-Demand
Rubrik
Passwords Are Pass�: Next Gen Authentication Addresses Today's Threats

Passwords Are Pass�: Next Gen Authentication Addresses Today's Threats

Passwordless is topic du jour in cybersecurity, and security teams are trying to make sense out of the plethora of technology options and identity layers available. Here's how to adopt a next-generation authentication architecture.

Passwords Are Pass�: Next Gen Authentication Addresses Today's Threats

Passwordless is topic du jour in cybersecurity, and security teams are trying to make sense out of the plethora of technology options and identity layers available. Here's how to adopt a next-generation authentication architecture.
Nord
Securing Identities in the Cloud

Securing Identities in the Cloud

| On-Demand | Tuesday, October 3, 2023 | 1pm ET |

Securing Identities in the Cloud

| On-Demand | Tuesday, October 3, 2023 | 1pm ET |
Radiant Logic
Security Data Analytics That Matter Most to The Modern Enterprise

Security Data Analytics That Matter Most to The Modern Enterprise

| Live Webinar | Thursday, October 26, 2023 | 1pm ET |

Security Data Analytics That Matter Most to The Modern Enterprise

| Live Webinar | Thursday, October 26, 2023 | 1pm ET |
Radiant Logic
Using AI in Application Security Tooling

Using AI in Application Security Tooling

| Live Webinar |Thursday, October 12, 2023 | 1pm ET |

Using AI in Application Security Tooling

| Live Webinar |Thursday, October 12, 2023 | 1pm ET |
Cloudflare
How to build data resiliency that works for (and with) real people

How to build data resiliency that works for (and with) real people

This whitepaper explores practical ways to work with unpredictable human behavior while bolstering your data security

How to build data resiliency that works for (and with) real people

This whitepaper explores practical ways to work with unpredictable human behavior while bolstering your data security
Crashplan
The MITRE ATT&CK MITRE ATT&CK under the microscope

The MITRE ATT&CK MITRE ATT&CK under the microscope

Increasingly complex threats are becoming more challenging to defend against. Advanced persistent threats are growing stronger and continuing to plague enterprises. Mitre Corp's ATT&CK framework aims to help organizations understand the different methods malicious actors use to compromise network security. Using the framework, enterprises can discover the ways their networks can be exploited, carry out adversary emulations, and learn mitigation and prevention strategies.

The MITRE ATT&CK MITRE ATT&CK under the microscope

Increasingly complex threats are becoming more challenging to defend against. Advanced persistent threats are growing stronger and continuing to plague enterprises. Mitre Corp's ATT&CK framework aims to help organizations understand the different methods malicious actors use to compromise network security. Using the framework, enterprises can discover the ways their networks can be exploited, carry out adversary emulations, and learn mitigation and prevention strategies.
Manage Engine
Attack Surface Management v2.0 by Brad LaPorte

Attack Surface Management v2.0 by Brad LaPorte

How missing out could lead to your next breach

Attack Surface Management v2.0 by Brad LaPorte

How missing out could lead to your next breach
Team Cymru
Forrester Total Economic Impact Report Infographic

Forrester Total Economic Impact Report Infographic

Total Economic Impact™ of Pure Signal™ Recon Infographic

Forrester Total Economic Impact Report Infographic

Total Economic Impact™ of Pure Signal™ Recon Infographic
Team Cymru
Forrester Total Economic Impact Report Infographic

Forrester Total Economic Impact Report Infographic

Total Economic Impact™ of Pure Signal™ Recon Infographic

Forrester Total Economic Impact Report Infographic

Total Economic Impact™ of Pure Signal™ Recon Infographic
Team Cymru
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.