Cybersecurity Resource Library

The #1 source for free Cybersecurity reports, whitepapers, webinars, research and more.

Showing results 931 - 960 of 996
Showing results 931 - 960 of 996

Filter by

Filters

Secure the Keys to Your Kingdom

Secure the Keys to Your Kingdom

Unveiling New Data on Global Attack Surface Threats

Secure the Keys to Your Kingdom

Unveiling New Data on Global Attack Surface Threats
Palo Alto Networks
Securing Cloud Assets

Securing Cloud Assets

How IT Security Pros Grade Their Own Progress

Securing Cloud Assets

How IT Security Pros Grade Their Own Progress
ExtraHop
Securing the Hybrid Enterprise

Securing the Hybrid Enterprise

The corporate world is witnessing a profound shift in the way people work and interact with digital assets.

Securing the Hybrid Enterprise

The corporate world is witnessing a profound shift in the way people work and interact with digital assets.
Appgate
Security Orchestration for Dummies

Security Orchestration for Dummies

Understaffed security teams struggle to execute standard processes across products in the face of rising alert volumes

Security Orchestration for Dummies

Understaffed security teams struggle to execute standard processes across products in the face of rising alert volumes
Palo Alto Networks
Self-Learning Cyber Defense for Financial Services - Intelligence Achieved

Self-Learning Cyber Defense for Financial Services - Intelligence Achieved

MixMode Predicts & Detects Attacks Legacy Platforms Can’t

Self-Learning Cyber Defense for Financial Services - Intelligence Achieved

MixMode Predicts & Detects Attacks Legacy Platforms Can’t
MixMode
Selling Breaches: The Transfer of Enterprise Network Access on Criminal Forums

Selling Breaches: The Transfer of Enterprise Network Access on Criminal Forums

Network compromise drives big business on the dark web. Cybercriminals are actively buying and selling unauthorized network access in a variety of underground forums.

Selling Breaches: The Transfer of Enterprise Network Access on Criminal Forums

Network compromise drives big business on the dark web. Cybercriminals are actively buying and selling unauthorized network access in a variety of underground forums.
Rapid7
SOC Analysts are Working the Wrong Problem

SOC Analysts are Working the Wrong Problem

It is difficult to overstate the importance of a security operations center (SOC) in today’s constant barrage of cyber threats.

SOC Analysts are Working the Wrong Problem

It is difficult to overstate the importance of a security operations center (SOC) in today’s constant barrage of cyber threats.
Sumo Logic
State of Attack Surface Management: A Crisis of Overconfidence

State of Attack Surface Management: A Crisis of Overconfidence

Security teams are staring down a troubling disconnect.

State of Attack Surface Management: A Crisis of Overconfidence

Security teams are staring down a troubling disconnect.
Team Cymru
State of Encrypted Attacks

State of Encrypted Attacks

Attacks over encrypted channels increased by 314% from 2020 to 2021.

State of Encrypted Attacks

Attacks over encrypted channels increased by 314% from 2020 to 2021.
Zscaler
State of SIEM Report

State of SIEM Report

Insights From 400 Security Professionals.

State of SIEM Report

Insights From 400 Security Professionals.
Panther
State of the Cloud: A Security Perspective

State of the Cloud: A Security Perspective

Accelerate your Security Modernization Now

State of the Cloud: A Security Perspective

Accelerate your Security Modernization Now
Sumo Logic
Successful Identity Integration During a Merger--and Beyond

Successful Identity Integration During a Merger--and Beyond

Use Case: Mergers and Acquisitions

Successful Identity Integration During a Merger--and Beyond

Use Case: Mergers and Acquisitions
Radiant Logic
The 'One Identity' Initiative

The 'One Identity' Initiative

Use Case: Identity Infrastructure

The 'One Identity' Initiative

Use Case: Identity Infrastructure
Radiant Logic
The 2022 Cybersecurity Survival Guide

The 2022 Cybersecurity Survival Guide

Accelerated Digital Transformation

The 2022 Cybersecurity Survival Guide

Accelerated Digital Transformation
BeyondTrust
The Annual Microsoft Vulnerabilities Report 2022

The Annual Microsoft Vulnerabilities Report 2022

Despite Uneven Progress, a Picture of Elevated Vulnerabilities Remains

The Annual Microsoft Vulnerabilities Report 2022

Despite Uneven Progress, a Picture of Elevated Vulnerabilities Remains
BeyondTrust
The Best Free and Open Source Tools for Cyber Risk Assessment and Mitigation

The Best Free and Open Source Tools for Cyber Risk Assessment and Mitigation

This paper discusses some of the free and open source tools and data sources that IT personnel can use to help keep their computers and networks fully patched and up-to-date.

The Best Free and Open Source Tools for Cyber Risk Assessment and Mitigation

This paper discusses some of the free and open source tools and data sources that IT personnel can use to help keep their computers and networks fully patched and up-to-date.
Vulcan Cyber
The Case for Cyber Risk Management Platforms

The Case for Cyber Risk Management Platforms

By Jon Oltsik, ESG Senior Principal Analyst and Fellow

The Case for Cyber Risk Management Platforms

By Jon Oltsik, ESG Senior Principal Analyst and Fellow
SimSpace
The CISOs Report Perspectives, Challenges and Plans for 2022 and Beyond

The CISOs Report Perspectives, Challenges and Plans for 2022 and Beyond

This study offers the kind of insights CISOs have long been asking for -- to benchmark their situation and experience against others; to learn from what their peers are doing and planning to do; and to validate ideas and obtain solid data to justify investments in these areas.

The CISOs Report Perspectives, Challenges and Plans for 2022 and Beyond

This study offers the kind of insights CISOs have long been asking for -- to benchmark their situation and experience against others; to learn from what their peers are doing and planning to do; and to validate ideas and obtain solid data to justify investments in these areas.
Feroot
The Definitive Guide to SASE Security

The Definitive Guide to SASE Security

Download your free copy of this ebook to discover why modern organizations adopt SASE security to deliver the maximum secure business impact.

The Definitive Guide to SASE Security

Download your free copy of this ebook to discover why modern organizations adopt SASE security to deliver the maximum secure business impact.
Menlo Security
The Effective Use of AI to Speed Detection and Response

The Effective Use of AI to Speed Detection and Response

Use automation for early detection and response

The Effective Use of AI to Speed Detection and Response

Use automation for early detection and response
Fortinet
The Failed Promises of SIEM

The Failed Promises of SIEM

How Next-Generation Cybersecurity Platforms are Solving the Problems Created by Outdated Tools

The Failed Promises of SIEM

How Next-Generation Cybersecurity Platforms are Solving the Problems Created by Outdated Tools
MixMode
The Flow of Security

The Flow of Security

Efficiency Relies On Identity Data

The Flow of Security

Efficiency Relies On Identity Data
Radiant Logic
The Forrester New Wave™: Zero Trust Network Access, Q3 2021

The Forrester New Wave™: Zero Trust Network Access, Q3 2021

The 15 Providers That Matter Most And How They Stack Up

The Forrester New Wave™: Zero Trust Network Access, Q3 2021

The 15 Providers That Matter Most And How They Stack Up
Appgate
The Future of Threat Intelligence

The Future of Threat Intelligence

Security teams need to easily scale operations, from creating enforcement policies, to pushing intelligence across their entire enterprise and security tools. That is where the Cortex® XSOAR Threat Intelligence Management platform excels.

The Future of Threat Intelligence

Security teams need to easily scale operations, from creating enforcement policies, to pushing intelligence across their entire enterprise and security tools. That is where the Cortex® XSOAR Threat Intelligence Management platform excels.
Palo Alto Networks
The Future of Threat Management for GRC

The Future of Threat Management for GRC

Our MXDR solution’s secret sauce derives from that pedigree: tested processes, proven IP, best-ofbreed technology, leveraged automation, and providing top-shelf talent

The Future of Threat Management for GRC

Our MXDR solution’s secret sauce derives from that pedigree: tested processes, proven IP, best-ofbreed technology, leveraged automation, and providing top-shelf talent
Optiv
The Guide to Multicloud Privilege Management

The Guide to Multicloud Privilege Management

Secure, Manage, & Audit All Privileged Access in a Hybrid & Multicloud World

The Guide to Multicloud Privilege Management

Secure, Manage, & Audit All Privileged Access in a Hybrid & Multicloud World
BeyondTrust
The Key to an Effective Cybersecurity Strategy: Hands-on Training

The Key to an Effective Cybersecurity Strategy: Hands-on Training

Today's security landscape has no shortage of tools and technologies. But unless the people using those tools are continuously upskilling, your cybersecurity strategy is costing you time and money.

The Key to an Effective Cybersecurity Strategy: Hands-on Training

Today's security landscape has no shortage of tools and technologies. But unless the people using those tools are continuously upskilling, your cybersecurity strategy is costing you time and money.
Rangeforce
The Many Facets of Modern Application Development

The Many Facets of Modern Application Development

A Comprehensive Guide for Leaders and Practitioners -- Part 1

The Many Facets of Modern Application Development

A Comprehensive Guide for Leaders and Practitioners -- Part 1
Checkmarx
The Many Risks of Modern Application Development(MAD)

The Many Risks of Modern Application Development(MAD)

A Comprehensive Guide for Leaders and Practitioners -- Part 2

The Many Risks of Modern Application Development(MAD)

A Comprehensive Guide for Leaders and Practitioners -- Part 2
Checkmarx
The Real Economic Value of Zero Trust Network Access

The Real Economic Value of Zero Trust Network Access

Nemertes’ Real Economic Value study independently evaluated the business and operational impact of Appgate SDP, a Zero Trust Network Access (ZTNA) solution.

The Real Economic Value of Zero Trust Network Access

Nemertes’ Real Economic Value study independently evaluated the business and operational impact of Appgate SDP, a Zero Trust Network Access (ZTNA) solution.
Appgate
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.