Cybersecurity Resource Library

The #1 source for free Cybersecurity reports, whitepapers, webinars, research and more.

Showing results 721 - 750 of 995
Showing results 721 - 750 of 995

Filter by

Filters

Dynamic DNS Infrastructure: The Phisher's Cheat Code

Dynamic DNS Infrastructure: The Phisher's Cheat Code

The most targeted sector on the Dynamic DNS Infrastructure is finance, alongside e-commerce, social media, streaming, and cryptocurrency.

Dynamic DNS Infrastructure: The Phisher's Cheat Code

The most targeted sector on the Dynamic DNS Infrastructure is finance, alongside e-commerce, social media, streaming, and cryptocurrency.
BlueVoyant
Endpoint Security Buyers Guide

Endpoint Security Buyers Guide

As cyber threats become ever more complex, the pressure to have the right endpoint solution in place has also grown.

Endpoint Security Buyers Guide

As cyber threats become ever more complex, the pressure to have the right endpoint solution in place has also grown.
Sophos
Extended Detection and Response (XDR) - Beginner's Guide

Extended Detection and Response (XDR) - Beginner's Guide

XDR is designed to give organizations a holistic view of their cybersecurity posture and IT environment with the ability to quickly pivot to deep investigation when further investigation is required.

Extended Detection and Response (XDR) - Beginner's Guide

XDR is designed to give organizations a holistic view of their cybersecurity posture and IT environment with the ability to quickly pivot to deep investigation when further investigation is required.
Sophos
Five Principles of Modern Application Security Programs

Five Principles of Modern Application Security Programs

Companies of all sizes and across all industries and geographies have one unfortunate thing in common: They’re prime targets for cyberattacks.

Five Principles of Modern Application Security Programs

Companies of all sizes and across all industries and geographies have one unfortunate thing in common: They’re prime targets for cyberattacks.
Mend
Getting Started with Threat Hunting

Getting Started with Threat Hunting

Practical guidance on preparing to search for and neutralize elusive cyber threats

Getting Started with Threat Hunting

Practical guidance on preparing to search for and neutralize elusive cyber threats
Sophos
How to Build a Successful AppSec Program

How to Build a Successful AppSec Program

Enterprise Web Application Security Best Practices

How to Build a Successful AppSec Program

Enterprise Web Application Security Best Practices
Invicti
Incorporating a Prevention Mindset into Threat Detection and Response

Incorporating a Prevention Mindset into Threat Detection and Response

Security teams can proactively anticipate the attacker’s next move instead of reacting to specific threats.

Incorporating a Prevention Mindset into Threat Detection and Response

Security teams can proactively anticipate the attacker’s next move instead of reacting to specific threats.
Deep Instinct
Invicti AppSec Indicator: Tuning Out the AppSec Noise is All About DAST

Invicti AppSec Indicator: Tuning Out the AppSec Noise is All About DAST

If we want to quiet the noise in application security (AppSec), modern solutions must take center stage.

Invicti AppSec Indicator: Tuning Out the AppSec Noise is All About DAST

If we want to quiet the noise in application security (AppSec), modern solutions must take center stage.
Invicti
Invicti's 2022 ESG Report: Automated Application Security Testing for Faster Development

Invicti's 2022 ESG Report: Automated Application Security Testing for Faster Development

Automated Application Security Testing that Increases Efficiency across the Software Development Lifecycle

Invicti's 2022 ESG Report: Automated Application Security Testing for Faster Development

Automated Application Security Testing that Increases Efficiency across the Software Development Lifecycle
Invicti
Managed Detection and Response (MDR) Services Buyers Guide

Managed Detection and Response (MDR) Services Buyers Guide

This guide provides clarity by walking you through the key considerations when choosing an MDR service.

Managed Detection and Response (MDR) Services Buyers Guide

This guide provides clarity by walking you through the key considerations when choosing an MDR service.
Sophos
OneBlood Case Study

OneBlood Case Study

An Ounce of Prevention is Worth a Pound of Cure.

OneBlood Case Study

An Ounce of Prevention is Worth a Pound of Cure.
Deep Instinct
Sophos 2022 Threat Report

Sophos 2022 Threat Report

Interrelated threats target an interdependent world

Sophos 2022 Threat Report

Interrelated threats target an interdependent world
Sophos
The Annual Cloud Data Security Survey

The Annual Cloud Data Security Survey

2022 September

The Annual Cloud Data Security Survey

2022 September
Flow Security
The Devil  in The Details:  The Importance of SBOMs  in Protecting the Software  Supply Chain

The Devil in The Details: The Importance of SBOMs in Protecting the Software Supply Chain

In order to mitigate open source risks, it’s essential to remediate open source vulnerabilities as soon as they are discovered.

The Devil in The Details: The Importance of SBOMs in Protecting the Software Supply Chain

In order to mitigate open source risks, it’s essential to remediate open source vulnerabilities as soon as they are discovered.
Mend
The Rising Threat of Smishing: A Deep Dive

The Rising Threat of Smishing: A Deep Dive

As phishing threats grow both in quantity and sophistication, BlueVoyant continues to investigate trends in the phishing landscape, new methods and techniques used by threat actors, and evolving mitigation strategies to stay ahead of the curve

The Rising Threat of Smishing: A Deep Dive

As phishing threats grow both in quantity and sophistication, BlueVoyant continues to investigate trends in the phishing landscape, new methods and techniques used by threat actors, and evolving mitigation strategies to stay ahead of the curve
BlueVoyant
Top Tactics for AppSec Innovation

Top Tactics for AppSec Innovation

Behaving like a threat actor puts software to the ultimate test.

Top Tactics for AppSec Innovation

Behaving like a threat actor puts software to the ultimate test.
Mend
Voice of SecOps 2021, 2nd Edition

Voice of SecOps 2021, 2nd Edition

The Perception of Threat Prevention

Voice of SecOps 2021, 2nd Edition

The Perception of Threat Prevention
Deep Instinct
Welcome to Modern Web App Security

Welcome to Modern Web App Security

Threats are inevitable. Tradeoffs shouldn’t be.

Welcome to Modern Web App Security

Threats are inevitable. Tradeoffs shouldn’t be.
Invicti
Cybersecurity in a post-pandemic world: A focus on financial services

Cybersecurity in a post-pandemic world: A focus on financial services

Short-term fixes should advance promptly to steady state

Cybersecurity in a post-pandemic world: A focus on financial services

Short-term fixes should advance promptly to steady state
Deloitte
Earning digital trust: Where to invest today and tomorrow

Earning digital trust: Where to invest today and tomorrow

Leaders can invest in these four emerging digital trust solutions to enable more trusted data and information for the foreseeable future

Earning digital trust: Where to invest today and tomorrow

Leaders can invest in these four emerging digital trust solutions to enable more trusted data and information for the foreseeable future
Deloitte
Global third-party risk management survey 2022

Global third-party risk management survey 2022

Emerging stronger The rise of sustainable and resilient supply chains

Global third-party risk management survey 2022

Emerging stronger The rise of sustainable and resilient supply chains
Deloitte
Manufacturing sector threat landscape

Manufacturing sector threat landscape

Deloitte Cyber Threat Intelligence (CTI) Global Threat Assessment

Manufacturing sector threat landscape

Deloitte Cyber Threat Intelligence (CTI) Global Threat Assessment
Deloitte
The Myths of Training Cybersecurity Professionals

The Myths of Training Cybersecurity Professionals

Training myths can reduce preparedness

The Myths of Training Cybersecurity Professionals

Training myths can reduce preparedness
Cybrary
AppSec Considerations For Modern Application Development

AppSec Considerations For Modern Application Development

A Comprehensive Guide for Leaders and Practitioners -- Part 3

AppSec Considerations For Modern Application Development

A Comprehensive Guide for Leaders and Practitioners -- Part 3
Checkmarx
The Many Facets of Modern Application Development

The Many Facets of Modern Application Development

A Comprehensive Guide for Leaders and Practitioners -- Part 1

The Many Facets of Modern Application Development

A Comprehensive Guide for Leaders and Practitioners -- Part 1
Checkmarx
The Many Risks of Modern Application Development

The Many Risks of Modern Application Development

A Comprehensive Guide for Leaders and Practitioners -- Part 2

The Many Risks of Modern Application Development

A Comprehensive Guide for Leaders and Practitioners -- Part 2
Checkmarx
2022 SonicWall Cyber Threat Report

2022 SonicWall Cyber Threat Report

Proactive Defense is the Future of Cybersecurity

2022 SonicWall Cyber Threat Report

Proactive Defense is the Future of Cybersecurity
SonicWall
Emerging Cyber Vulnerabilities That Every Enterprise Should Know About

Emerging Cyber Vulnerabilities That Every Enterprise Should Know About

Log4j appeared less than a year ago but will be with us for many years to come, and the industry is planning a long-term strategy to mitigate it. Plus, a look at the state of other significant patches.

Emerging Cyber Vulnerabilities That Every Enterprise Should Know About

Log4j appeared less than a year ago but will be with us for many years to come, and the industry is planning a long-term strategy to mitigate it. Plus, a look at the state of other significant patches.
SonicWall
How to Simplify Security with a Cybersecurity Mesh Architecture

How to Simplify Security with a Cybersecurity Mesh Architecture

Digital acceleration demands integrated protection

How to Simplify Security with a Cybersecurity Mesh Architecture

Digital acceleration demands integrated protection
Fortinet
Making Cybersecurity Mesh a Reality

Making Cybersecurity Mesh a Reality

Keys to an effective cybersecurity platform

Making Cybersecurity Mesh a Reality

Keys to an effective cybersecurity platform
Fortinet
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.