Cybersecurity Resource Library

The #1 source for free Cybersecurity reports, whitepapers, webinars, research and more.

Showing results 631 - 660 of 997
Showing results 631 - 660 of 997

Filter by

Filters

Know your customer: Enable a 360-degree view with customer identity & access management

Know your customer: Enable a 360-degree view with customer identity & access management

Establishing a 360-degree view isn’t easy, and it is only getting harder. Discover how to break down internal silos to build that 360-degree view

Know your customer: Enable a 360-degree view with customer identity & access management

Establishing a 360-degree view isn’t easy, and it is only getting harder. Discover how to break down internal silos to build that 360-degree view
Deloitte
Rediscovering your identity  How a comprehensive approach to digital identity management can empower everyone

Rediscovering your identity How a comprehensive approach to digital identity management can empower everyone

With traditional digital walls gone and consumer expectations rising, companies are struggling to find effective digital identity management solutions. It is critical to approach enterprise and consumer identity with equal vigor, explore managed services, and integrate new technologies.

Rediscovering your identity How a comprehensive approach to digital identity management can empower everyone

With traditional digital walls gone and consumer expectations rising, companies are struggling to find effective digital identity management solutions. It is critical to approach enterprise and consumer identity with equal vigor, explore managed services, and integrate new technologies.
Deloitte
2023 Cloud Threat Report

2023 Cloud Threat Report

This 2023 Cloud Threat Report encompasses our research and practical experience from the past year in ensuring the security of enterprise cloud environments.

2023 Cloud Threat Report

This 2023 Cloud Threat Report encompasses our research and practical experience from the past year in ensuring the security of enterprise cloud environments.
Wiz
The Cloud Security Workflow Handbook

The Cloud Security Workflow Handbook

A practical guide to transforming security teams, processes, and tools to support cloud development. learn the four phases of the new cloud security operating model.

The Cloud Security Workflow Handbook

A practical guide to transforming security teams, processes, and tools to support cloud development. learn the four phases of the new cloud security operating model.
Wiz
The Promise and Reality of Cloud Security

The Promise and Reality of Cloud Security

The head-spinning rush to the cloud in the wake of the COVID-19 pandemic laid bare a new category of security risks that has forced both enterprises and cloud providers to adapt their security practices. See how cloud security is rapidly evolving.

The Promise and Reality of Cloud Security

The head-spinning rush to the cloud in the wake of the COVID-19 pandemic laid bare a new category of security risks that has forced both enterprises and cloud providers to adapt their security practices. See how cloud security is rapidly evolving.
Wiz
2023 Ransomware Trends Report

2023 Ransomware Trends Report

Ransomware is a problem that everyone has but no one wants to talk about publicly.

2023 Ransomware Trends Report

Ransomware is a problem that everyone has but no one wants to talk about publicly.
Veeam
NORTH AMERICA EXECUTIVE SUMMARY 2023 Ransomware Trends Report

NORTH AMERICA EXECUTIVE SUMMARY 2023 Ransomware Trends Report

Paying the ransom does not ensure recoverability

NORTH AMERICA EXECUTIVE SUMMARY 2023 Ransomware Trends Report

Paying the ransom does not ensure recoverability
Veeam
Ransomware: 6 Capabilities You Need for Rapid Recovery

Ransomware: 6 Capabilities You Need for Rapid Recovery

These best practices allow you to have the appropriate safeguards to ensure the delivery of reliable backup and recovery for your critical infrastructure services and to ensure your data will be there when you need it.

Ransomware: 6 Capabilities You Need for Rapid Recovery

These best practices allow you to have the appropriate safeguards to ensure the delivery of reliable backup and recovery for your critical infrastructure services and to ensure your data will be there when you need it.
Veeam
A Passwordless Future Begins with Credential Management

A Passwordless Future Begins with Credential Management

Passwords are a major security flaw, yet still remain a staple of most enterprises.

A Passwordless Future Begins with Credential Management

Passwords are a major security flaw, yet still remain a staple of most enterprises.
Axiad
A Pragmatic Path to Passwordless and Phishing Resistance

A Pragmatic Path to Passwordless and Phishing Resistance

While the types of cyberattacks are wide and diverse, 82% of attacks involve a human element, primarily exploiting credentials and phishing.

A Pragmatic Path to Passwordless and Phishing Resistance

While the types of cyberattacks are wide and diverse, 82% of attacks involve a human element, primarily exploiting credentials and phishing.
Axiad
Navigating the Path to Enhanced Authentication

Navigating the Path to Enhanced Authentication

Conventional wisdom now suggests that fine tuning authentication is an important step in protecting your organization.

Navigating the Path to Enhanced Authentication

Conventional wisdom now suggests that fine tuning authentication is an important step in protecting your organization.
Axiad
The Guide to Passwordless Authentication

The Guide to Passwordless Authentication

With 92% of CISOs predicting that passwordless is the future of authentication, it is easy to see why it is a trending topic.

The Guide to Passwordless Authentication

With 92% of CISOs predicting that passwordless is the future of authentication, it is easy to see why it is a trending topic.
Axiad
4 Steps to Conduct an Insider Risk Investigation Using a Human-Centric Approach

4 Steps to Conduct an Insider Risk Investigation Using a Human-Centric Approach

Times have changed.

4 Steps to Conduct an Insider Risk Investigation Using a Human-Centric Approach

Times have changed.
Code42 Software
Better Log Analytics for less stressed engineers

Better Log Analytics for less stressed engineers

Organizations today rely on key applications running on complex multi-cloud environments to transact business and work. A sound log management practice with insightful analytics not only helps ensure those applications are reliable and secure, but it can reduce the “cognitive load” put on engineers by empowering them with efficient troubleshooting in order to resolve and rescue MTTR.

Better Log Analytics for less stressed engineers

Organizations today rely on key applications running on complex multi-cloud environments to transact business and work. A sound log management practice with insightful analytics not only helps ensure those applications are reliable and secure, but it can reduce the “cognitive load” put on engineers by empowering them with efficient troubleshooting in order to resolve and rescue MTTR.
Sumo Logic
Code42 Annual Data Exposure Report

Code42 Annual Data Exposure Report

Findings show that cybersecurity teams are facing unprecedented challenges when it comes to protecting sensitive corporate data.

Code42 Annual Data Exposure Report

Findings show that cybersecurity teams are facing unprecedented challenges when it comes to protecting sensitive corporate data.
Code42 Software
Code42 Annual Data Exposure Report 2023

Code42 Annual Data Exposure Report 2023

Findings reveal Insider Risk is one of the hardest cybersecurity threats to detect

Code42 Annual Data Exposure Report 2023

Findings reveal Insider Risk is one of the hardest cybersecurity threats to detect
Code42 Software
How Snowflake Keeps Critical IP Safe Without Disrupting Productivity

How Snowflake Keeps Critical IP Safe Without Disrupting Productivity

Challenge: Full visibility without roadblocks

How Snowflake Keeps Critical IP Safe Without Disrupting Productivity

Challenge: Full visibility without roadblocks
Code42 Software
How to Prevent Burnout: Protect Your Employees and Your Data

How to Prevent Burnout: Protect Your Employees and Your Data

How security leaders can build user-centric security programs that reduce employee stress & enhance adherence

How to Prevent Burnout: Protect Your Employees and Your Data

How security leaders can build user-centric security programs that reduce employee stress & enhance adherence
Code42 Software
Okta Chooses IRM Over CASB to Avoid Data Leak from Cloud File Sharing

Okta Chooses IRM Over CASB to Avoid Data Leak from Cloud File Sharing

Learn how Okta's security team addressed increasing data risk by prioritizing a data protection initiative that would bolster their control over cloud data.

Okta Chooses IRM Over CASB to Avoid Data Leak from Cloud File Sharing

Learn how Okta's security team addressed increasing data risk by prioritizing a data protection initiative that would bolster their control over cloud data.
Code42 Software
Puzzled by Patching: Solve Endpoint Pains

Puzzled by Patching: Solve Endpoint Pains

| Available On-Demand |

Puzzled by Patching: Solve Endpoint Pains

| Available On-Demand |
Automox
Ten Emerging Vulnerabilities Every Enterprise Should Know

Ten Emerging Vulnerabilities Every Enterprise Should Know

| Available On-Demand |

Ten Emerging Vulnerabilities Every Enterprise Should Know

| Available On-Demand |
SonicWall
Successfully Managing Identity in Modern Cloud and Hybrid Environments

Successfully Managing Identity in Modern Cloud and Hybrid Environments

Cloud promised to simplify the security and management of enterprise systems. In many ways it has, but when it comes to identity management it’s as complicated as ever. This report details how to get identity programs on track -- and keep them that way.

Successfully Managing Identity in Modern Cloud and Hybrid Environments

Cloud promised to simplify the security and management of enterprise systems. In many ways it has, but when it comes to identity management it’s as complicated as ever. This report details how to get identity programs on track -- and keep them that way.
Radiant Logic
Building Out the Best Response Playbook for Ransomware Attacks

Building Out the Best Response Playbook for Ransomware Attacks

| Available On-Demand |

Building Out the Best Response Playbook for Ransomware Attacks

| Available On-Demand |
Palo Alto Networks
How to Accelerate XDR Outcomes: Bridging the Gap Between Network and Endpoint

How to Accelerate XDR Outcomes: Bridging the Gap Between Network and Endpoint

| Available On-Demand |

How to Accelerate XDR Outcomes: Bridging the Gap Between Network and Endpoint

| Available On-Demand |
ExtraHop
Microsoft 365  and Integrated Cloud Email Security: Transitioning from a SEG to ICES

Microsoft 365 and Integrated Cloud Email Security: Transitioning from a SEG to ICES

Learn how to transitioning from a secure email gateway to integrated cloud email security to meet the demands of the new threat landscape.

Microsoft 365 and Integrated Cloud Email Security: Transitioning from a SEG to ICES

Learn how to transitioning from a secure email gateway to integrated cloud email security to meet the demands of the new threat landscape.
SlashNext
State of Phishing 2022

State of Phishing 2022

Download this report to learn about the latest threat trends and what’s required to avoid breaches in 2022.

State of Phishing 2022

Download this report to learn about the latest threat trends and what’s required to avoid breaches in 2022.
SlashNext
The Human Hacking Report

The Human Hacking Report

Download this report to learn how phishing is a human problem that needs to be addressed across all digital channels.

The Human Hacking Report

Download this report to learn how phishing is a human problem that needs to be addressed across all digital channels.
SlashNext
The Mobile BYOD Intelligence Report

The Mobile BYOD Intelligence Report

New research on Bring Your Own Device (BYOD) trends for today's workforce and the security risks for organizations.

The Mobile BYOD Intelligence Report

New research on Bring Your Own Device (BYOD) trends for today's workforce and the security risks for organizations.
SlashNext
The Threat Landscape is Evolving to Multi-Channel Attacks

The Threat Landscape is Evolving to Multi-Channel Attacks

Learn how multi-channel work new threat landscape.

The Threat Landscape is Evolving to Multi-Channel Attacks

Learn how multi-channel work new threat landscape.
SlashNext
How Supply Chain Attacks Work -- And What You Can Do to Stop Them

How Supply Chain Attacks Work -- And What You Can Do to Stop Them

| Available On-Demand |

How Supply Chain Attacks Work -- And What You Can Do to Stop Them

| Available On-Demand |
Mend
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.