Cybersecurity Resource Library

The #1 source for free Cybersecurity reports, whitepapers, webinars, research and more.

Showing results 91 - 120 of 995
Showing results 91 - 120 of 995

Filter by

Filters

DSPM Buyer's Guide

DSPM Buyer's Guide

Download the DSPM Buyer's Guide to learn what to look for in a DSPM solution, key considerations when evaluating DSPM solutions, and how to spot a legacy approach claiming "DSPM".

DSPM Buyer's Guide

Download the DSPM Buyer's Guide to learn what to look for in a DSPM solution, key considerations when evaluating DSPM solutions, and how to spot a legacy approach claiming "DSPM".
Cyera
From basics to best practices: Building a strong AppSec program

From basics to best practices: Building a strong AppSec program

Are you aiming to build a stronger AppSec program but unsure how to effectively involve your developers? Inside you’ll learn how to select the right SAST and SCA tools, foster a security-centric developer culture and address slow tool performance while building a resilient application infrastructure.

From basics to best practices: Building a strong AppSec program

Are you aiming to build a stronger AppSec program but unsure how to effectively involve your developers? Inside you’ll learn how to select the right SAST and SCA tools, foster a security-centric developer culture and address slow tool performance while building a resilient application infrastructure.
Snyk
Gartner Leader's Guide to Software Supply Chain Security

Gartner Leader's Guide to Software Supply Chain Security

Software supply chain security is a critical risk and compliance issue, but most organizations approach it in a fragmented way.

Gartner Leader's Guide to Software Supply Chain Security

Software supply chain security is a critical risk and compliance issue, but most organizations approach it in a fragmented way.
OpenText
Gartner Magic Quadrant for Application Security Testing

Gartner Magic Quadrant for Application Security Testing

When it comes to application security, it’s important to align yourself with an experienced partner you can trust.

Gartner Magic Quadrant for Application Security Testing

When it comes to application security, it’s important to align yourself with an experienced partner you can trust.
OpenText
IDC White Paper: The Peril and Promise of Generative AI in Application Security

IDC White Paper: The Peril and Promise of Generative AI in Application Security

As the adoption of generative AI (GenAI) accelerates, so does the frequency and sophistication of attacks on AI systems.

IDC White Paper: The Peril and Promise of Generative AI in Application Security

As the adoption of generative AI (GenAI) accelerates, so does the frequency and sophistication of attacks on AI systems.
OpenText
Dependency Automation: Developer Delight & Security Satisfaction

Dependency Automation: Developer Delight & Security Satisfaction

Tuesday, October 1, 2024 at 1 PM EDT

Dependency Automation: Developer Delight & Security Satisfaction

Tuesday, October 1, 2024 at 1 PM EDT
Mend
Gartner Report: Cyber Asset Attack Surface Management

Gartner Report: Cyber Asset Attack Surface Management

Cyber asset attack surface management (CAASM) improves security posture by providing a real-time view of all internal and external assets. For a complete view of the CAASM market landscape, check out the new Gartner Peer Insights(TM) Voice of the Customer Report. runZero is honored to be recognized as the 2024 Customers’ Choice and to have the highest ranking of any vendor for "willingness to recommend" at 96%.

Gartner Report: Cyber Asset Attack Surface Management

Cyber asset attack surface management (CAASM) improves security posture by providing a real-time view of all internal and external assets. For a complete view of the CAASM market landscape, check out the new Gartner Peer Insights(TM) Voice of the Customer Report. runZero is honored to be recognized as the 2024 Customers’ Choice and to have the highest ranking of any vendor for "willingness to recommend" at 96%.
runZero
How to Find Your Most Critical Risks in the Cloud

How to Find Your Most Critical Risks in the Cloud

Wednesday, October 9, 2024 at 1:00pm EDT

How to Find Your Most Critical Risks in the Cloud

Wednesday, October 9, 2024 at 1:00pm EDT
Wiz
Solution Brief: Introducing the runZero Platform

Solution Brief: Introducing the runZero Platform

runZero is the only CAASM (cyber asset attack surface management) solution that combines powerful proprietary active scanning, native passive discovery and API integrations. Unifying these discovery approaches makes our platform unique in its ability to discover and provide accurate, in-depth fingerprinting for all IT, OT, and IoT devices across on-prem, cloud, and remote environments, including identifying risky unmanaged assets, unknown networks, and outliers. Learn more in our solution brief

Solution Brief: Introducing the runZero Platform

runZero is the only CAASM (cyber asset attack surface management) solution that combines powerful proprietary active scanning, native passive discovery and API integrations. Unifying these discovery approaches makes our platform unique in its ability to discover and provide accurate, in-depth fingerprinting for all IT, OT, and IoT devices across on-prem, cloud, and remote environments, including identifying risky unmanaged assets, unknown networks, and outliers. Learn more in our solution brief
runZero
The State of Asset Security: Uncovering Alarming Gaps & Unexpected Exposures

The State of Asset Security: Uncovering Alarming Gaps & Unexpected Exposures

runZero's research team analyzed tens of millions of data points to understand attack surfaces, exposure patterns, and emerging threats. Our research reveals alarming gaps and unexpected trends, including the decay of network segmentation, persistent challenges in attack surface management, and an increasing volume of dark matter on modern networks. Get the full report to see what we found!

The State of Asset Security: Uncovering Alarming Gaps & Unexpected Exposures

runZero's research team analyzed tens of millions of data points to understand attack surfaces, exposure patterns, and emerging threats. Our research reveals alarming gaps and unexpected trends, including the decay of network segmentation, persistent challenges in attack surface management, and an increasing volume of dark matter on modern networks. Get the full report to see what we found!
runZero
DORA and PCI DSS 4.0: Scale Your Mainframe Security Strategy Among Evolving Regulations

DORA and PCI DSS 4.0: Scale Your Mainframe Security Strategy Among Evolving Regulations

Thursday, September 26, 2024 at 1PM EDT

DORA and PCI DSS 4.0: Scale Your Mainframe Security Strategy Among Evolving Regulations

Thursday, September 26, 2024 at 1PM EDT
Rocket Software
A CISO's Guide to Geopolitics and CyberSecurity

A CISO's Guide to Geopolitics and CyberSecurity

Geopolitical strain has escalated into cyberwarefare. CISOs need to know how to not only respond to such attacks, but prevent them.

A CISO's Guide to Geopolitics and CyberSecurity

Geopolitical strain has escalated into cyberwarefare. CISOs need to know how to not only respond to such attacks, but prevent them.
ExtraHop
Achieving CMMC Compliance with CTEM

Achieving CMMC Compliance with CTEM

Achieve CMMC compliance with ease by leveraging Continuous Threat Exposure Management (CTEM). Discover actionable strategies to enhance your security posture and safeguard sensitive data from evolving threats

Achieving CMMC Compliance with CTEM

Achieve CMMC compliance with ease by leveraging Continuous Threat Exposure Management (CTEM). Discover actionable strategies to enhance your security posture and safeguard sensitive data from evolving threats
Praetorian
Achieving NYDFS Compliance with CTEM

Achieving NYDFS Compliance with CTEM

Enhance your cybersecurity strategy with CTEM to meet NYDFS requirements! Proactively identify threats and manage risks while ensuring compliance.

Achieving NYDFS Compliance with CTEM

Enhance your cybersecurity strategy with CTEM to meet NYDFS requirements! Proactively identify threats and manage risks while ensuring compliance.
Praetorian
Continuous Threat Exposure Management (CTEM) and NIST SP 800-171 Compliance

Continuous Threat Exposure Management (CTEM) and NIST SP 800-171 Compliance

Align the proactive approach of CTEM with the latest NIST guidelines, through real-world insights and actionable strategies to strengthen your security posture, ensure compliance, and safeguard sensitive data against evolving threats.

Continuous Threat Exposure Management (CTEM) and NIST SP 800-171 Compliance

Align the proactive approach of CTEM with the latest NIST guidelines, through real-world insights and actionable strategies to strengthen your security posture, ensure compliance, and safeguard sensitive data against evolving threats.
Praetorian
CTEM - A Blueprint to Modern Cybersecurity Testing

CTEM - A Blueprint to Modern Cybersecurity Testing

Cut through the Noise to Focus on the Risk. Discover practical strategies, advice, and guidance to transform your Traditional Vulnerability Management practice into a Countinuous Threate Exposure Management (CTEM) strategy.

CTEM - A Blueprint to Modern Cybersecurity Testing

Cut through the Noise to Focus on the Risk. Discover practical strategies, advice, and guidance to transform your Traditional Vulnerability Management practice into a Countinuous Threate Exposure Management (CTEM) strategy.
Praetorian
Diagnosing the Healthcare Attack Surface

Diagnosing the Healthcare Attack Surface

Learn how an continuous offensive strategies can protect sensitive data in the highly complex and vulnerable environment of a healthcare system.

Diagnosing the Healthcare Attack Surface

Learn how an continuous offensive strategies can protect sensitive data in the highly complex and vulnerable environment of a healthcare system.
Praetorian
Digging Out of Your Organization's Technical Debt

Digging Out of Your Organization's Technical Debt

Poor cybersecurity hygiene, legacy systems, out-of-date software, and poor patching make IT security difficult. Experts weigh in on who can help with assessing enterprise technical debt and coming up with a plan to dig you, and your enterprise, out.

Digging Out of Your Organization's Technical Debt

Poor cybersecurity hygiene, legacy systems, out-of-date software, and poor patching make IT security difficult. Experts weigh in on who can help with assessing enterprise technical debt and coming up with a plan to dig you, and your enterprise, out.
DataBee
Digging Out of Your Organization's Technical Debt: Executive Summary

Digging Out of Your Organization's Technical Debt: Executive Summary

This is an executive summary of the “Digging Out of Your Organization's Technical Debt” webinar that took place 08/14/2024. The speakers were Roselle Safran, Cybersecurity Expert and Entrepreneur, and Jill Cagliostro, Director 1, Product Management. The webinar was moderated by Becky Bracken, editor at Dark Reading.

Digging Out of Your Organization's Technical Debt: Executive Summary

This is an executive summary of the “Digging Out of Your Organization's Technical Debt” webinar that took place 08/14/2024. The speakers were Roselle Safran, Cybersecurity Expert and Entrepreneur, and Jill Cagliostro, Director 1, Product Management. The webinar was moderated by Becky Bracken, editor at Dark Reading.
DataBee
Evolve Your Ransomware Defense

Evolve Your Ransomware Defense

Outsmart Ransomware: Discover How RevealX's Full Network Visibility Can Slash Detection Times and Boost Your ROI by 193%

Evolve Your Ransomware Defense

Outsmart Ransomware: Discover How RevealX's Full Network Visibility Can Slash Detection Times and Boost Your ROI by 193%
ExtraHop
Harnessing the Power of Automation to Boost Enterprise Cybersecurity

Harnessing the Power of Automation to Boost Enterprise Cybersecurity

Thursday, October 3, 2024 at 1pm ET

Harnessing the Power of Automation to Boost Enterprise Cybersecurity

Thursday, October 3, 2024 at 1pm ET
Automox
RevealX Catches Ransomware Within Days of Deployment at Wood County Hospital

RevealX Catches Ransomware Within Days of Deployment at Wood County Hospital

The landscape of ransomware attacks is rapidly evolving. Learn how ExtraHop Reveal X was able to detect and thwart an attack for Wood County Hospital, just days after launch.

RevealX Catches Ransomware Within Days of Deployment at Wood County Hospital

The landscape of ransomware attacks is rapidly evolving. Learn how ExtraHop Reveal X was able to detect and thwart an attack for Wood County Hospital, just days after launch.
ExtraHop
The Anatomy of a Ransomware Attack

The Anatomy of a Ransomware Attack

Unpacking a Ransomware Attack, Minute by Minute. If you could detect every inflection point of a ransomware attack as it unfolded in real time, what would you do differently?

The Anatomy of a Ransomware Attack

Unpacking a Ransomware Attack, Minute by Minute. If you could detect every inflection point of a ransomware attack as it unfolded in real time, what would you do differently?
ExtraHop
The ROI of RevealX Against Ransomware

The ROI of RevealX Against Ransomware

With ransomware incidents increasing by 50% in 2023, you need crucial detection that existing security tools miss. See how RevealX addresses gaps in traditional security measures, providing faster threat detection and resolution.

The ROI of RevealX Against Ransomware

With ransomware incidents increasing by 50% in 2023, you need crucial detection that existing security tools miss. See how RevealX addresses gaps in traditional security measures, providing faster threat detection and resolution.
ExtraHop
State of AI in Cybersecurity: Beyond the Hype

State of AI in Cybersecurity: Beyond the Hype

| Live Virtual Event | Wednesday, October 30, 2024 | 11:00am ET | Doors Open at 10:30am ET

State of AI in Cybersecurity: Beyond the Hype

| Live Virtual Event | Wednesday, October 30, 2024 | 11:00am ET | Doors Open at 10:30am ET
Dark Reading and InformationWeek
Threat Hunting: Tools and Techniques to Stay a Step Ahead of Cybercriminals

Threat Hunting: Tools and Techniques to Stay a Step Ahead of Cybercriminals

Wednesday, September 25, 2024 at 1 PM EST

Threat Hunting: Tools and Techniques to Stay a Step Ahead of Cybercriminals

Wednesday, September 25, 2024 at 1 PM EST
Sophos
Digital Doppelg�ngers: The Dual Faces of Deepfake Technology

Digital Doppelg�ngers: The Dual Faces of Deepfake Technology

On-Demand

Digital Doppelg�ngers: The Dual Faces of Deepfake Technology

On-Demand
Knowbe4
How to Evaluate Hybrid-Cloud Network Policies and Enhance Security

How to Evaluate Hybrid-Cloud Network Policies and Enhance Security

Wednesday, September 18, 2024 at 1 PM EDT

How to Evaluate Hybrid-Cloud Network Policies and Enhance Security

Wednesday, September 18, 2024 at 1 PM EDT
Tufin
Making Orchestration Work for Your Enterprise

Making Orchestration Work for Your Enterprise

Thursday, September 19, 2024 at 1 PM EDT

Making Orchestration Work for Your Enterprise

Thursday, September 19, 2024 at 1 PM EDT
Delinea
5 Essential Insights into Generative AI for Security Leaders

5 Essential Insights into Generative AI for Security Leaders

Generative AI in Security: What you need to know.

5 Essential Insights into Generative AI for Security Leaders

Generative AI in Security: What you need to know.
SentinelOne
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.