Cybersecurity Resource Library

The #1 source for free Cybersecurity reports, whitepapers, webinars, research and more.

Showing results 151 - 180 of 287
Showing results 151 - 180 of 287

Filter by

Filters

Okta Chooses IRM Over CASB to Avoid Data Leak from Cloud File Sharing

Okta Chooses IRM Over CASB to Avoid Data Leak from Cloud File Sharing

Learn how Okta's security team addressed increasing data risk by prioritizing a data protection initiative that would bolster their control over cloud data.

Okta Chooses IRM Over CASB to Avoid Data Leak from Cloud File Sharing

Learn how Okta's security team addressed increasing data risk by prioritizing a data protection initiative that would bolster their control over cloud data.
Code42 Software
Building the SOC of the Future: Next-Gen Security Operations

Building the SOC of the Future: Next-Gen Security Operations

| Available On-Demand |

Building the SOC of the Future: Next-Gen Security Operations

| Available On-Demand |
Palo Alto Networks
Augmenting Your Microsoft 365 EOP and MDO Email Security Infrastructure

Augmenting Your Microsoft 365 EOP and MDO Email Security Infrastructure

The move to the cloud has also allowed companies to streamline their email security investments.

Augmenting Your Microsoft 365 EOP and MDO Email Security Infrastructure

The move to the cloud has also allowed companies to streamline their email security investments.
Abnormal Security
CISO Guide to Business Email Compromise

CISO Guide to Business Email Compromise

How to Stop the $2.7 Billion Problem

CISO Guide to Business Email Compromise

How to Stop the $2.7 Billion Problem
Abnormal Security
CISO Guide to Email Platform Attacks

CISO Guide to Email Platform Attacks

New Vulnerabilities Impacting Cloud-Based Emails

CISO Guide to Email Platform Attacks

New Vulnerabilities Impacting Cloud-Based Emails
Abnormal Security
CISO Guide to Generative AI Attacks

CISO Guide to Generative AI Attacks

Discover how cybercriminals use generative AI tools like ChatGPT to create more effective email attacks and how to keep your organization protected.

CISO Guide to Generative AI Attacks

Discover how cybercriminals use generative AI tools like ChatGPT to create more effective email attacks and how to keep your organization protected.
Abnormal Security
Adopting a Defense-in-Depth Approach to IT Security

Adopting a Defense-in-Depth Approach to IT Security

Security needs to keep pace with your business organizations invest in technology today to drive their businesses forward, not just to streamline back-office processes

Adopting a Defense-in-Depth Approach to IT Security

Security needs to keep pace with your business organizations invest in technology today to drive their businesses forward, not just to streamline back-office processes
CyberArk Software, Inc
Banco Galicia Protects Staff, Partners and Exceeds Financial Compliance with CyberArk

Banco Galicia Protects Staff, Partners and Exceeds Financial Compliance with CyberArk

Banco Galicia is one of the main and largest private banks in Argentina offering a range of financial services to individuals and companies.

Banco Galicia Protects Staff, Partners and Exceeds Financial Compliance with CyberArk

Banco Galicia is one of the main and largest private banks in Argentina offering a range of financial services to individuals and companies.
CyberArk
Building a Business Case for CyberArk Endpoint Privilege Manager

Building a Business Case for CyberArk Endpoint Privilege Manager

The volume and sophistication of cybersecurity threats have steadily grown with the proliferation of identities, rise of the endpoints, cloud adoption, remote work and ransomware

Building a Business Case for CyberArk Endpoint Privilege Manager

The volume and sophistication of cybersecurity threats have steadily grown with the proliferation of identities, rise of the endpoints, cloud adoption, remote work and ransomware
CyberArk
QuickStart With Least Privilege Using Endpoint Privilege Manager

QuickStart With Least Privilege Using Endpoint Privilege Manager

CyberArk Endpoint Privilege Manager offers several post-deployment configuration options available immediately upon a new set creation such as, removing local administrators, QuickStart policies, credential threat protection, protection against ransomware, and restricting unhandled applications access to resources.

QuickStart With Least Privilege Using Endpoint Privilege Manager

CyberArk Endpoint Privilege Manager offers several post-deployment configuration options available immediately upon a new set creation such as, removing local administrators, QuickStart policies, credential threat protection, protection against ransomware, and restricting unhandled applications access to resources.
CyberArk
Why EDR isn't Enough to Stop Cyberattacks

Why EDR isn't Enough to Stop Cyberattacks

How CyberArk Endpoint Privilege Manager™ Tackles EDR Gaps

Why EDR isn't Enough to Stop Cyberattacks

How CyberArk Endpoint Privilege Manager™ Tackles EDR Gaps
CyberArk
Insider Threats Checklist

Insider Threats Checklist

The Insider Threats Checklist provides 10 steps to help guide you when defining an insider threat or insider risk defense program.

Insider Threats Checklist

The Insider Threats Checklist provides 10 steps to help guide you when defining an insider threat or insider risk defense program.
Exabeam
Keys to the Kingdom: Guidance for Effective Zero Trust Architecture

Keys to the Kingdom: Guidance for Effective Zero Trust Architecture

Maintaining resilient environments, creating repeatable processes, satisfying audits, and establishing impactful training programs are just a few ways to keep your networks and data secure. Learn how Zero Trust Architecture can help you secure your network.

Keys to the Kingdom: Guidance for Effective Zero Trust Architecture

Maintaining resilient environments, creating repeatable processes, satisfying audits, and establishing impactful training programs are just a few ways to keep your networks and data secure. Learn how Zero Trust Architecture can help you secure your network.
Exabeam
A CISO's Guide To Email Security 2023

A CISO's Guide To Email Security 2023

Get the latest insights

A CISO's Guide To Email Security 2023

Get the latest insights
Darktrace
Reducing Cyber Risk Through Preventative Cyber Security

Reducing Cyber Risk Through Preventative Cyber Security

Getting ahead of cyber-threats

Reducing Cyber Risk Through Preventative Cyber Security

Getting ahead of cyber-threats
Darktrace
2023 Global Future of Cyber Survey: Building long term value by putting cyber at the heart of the business

2023 Global Future of Cyber Survey: Building long term value by putting cyber at the heart of the business

This year’s global survey--Deloitte’s largest cyber survey to date--polled leaders across industries in order to get a clearer picture of where cyber stands and where it is going.

2023 Global Future of Cyber Survey: Building long term value by putting cyber at the heart of the business

This year’s global survey--Deloitte’s largest cyber survey to date--polled leaders across industries in order to get a clearer picture of where cyber stands and where it is going.
Deloitte
Know your customer: Enable a 360-degree view with customer identity & access management

Know your customer: Enable a 360-degree view with customer identity & access management

Establishing a 360-degree view isn’t easy, and it is only getting harder. Discover how to break down internal silos to build that 360-degree view

Know your customer: Enable a 360-degree view with customer identity & access management

Establishing a 360-degree view isn’t easy, and it is only getting harder. Discover how to break down internal silos to build that 360-degree view
Deloitte
The Cloud Security Workflow Handbook

The Cloud Security Workflow Handbook

A practical guide to transforming security teams, processes, and tools to support cloud development. learn the four phases of the new cloud security operating model.

The Cloud Security Workflow Handbook

A practical guide to transforming security teams, processes, and tools to support cloud development. learn the four phases of the new cloud security operating model.
Wiz
2023 Ransomware Trends Report

2023 Ransomware Trends Report

Ransomware is a problem that everyone has but no one wants to talk about publicly.

2023 Ransomware Trends Report

Ransomware is a problem that everyone has but no one wants to talk about publicly.
Veeam
NORTH AMERICA EXECUTIVE SUMMARY 2023 Ransomware Trends Report

NORTH AMERICA EXECUTIVE SUMMARY 2023 Ransomware Trends Report

Paying the ransom does not ensure recoverability

NORTH AMERICA EXECUTIVE SUMMARY 2023 Ransomware Trends Report

Paying the ransom does not ensure recoverability
Veeam
Ransomware: 6 Capabilities You Need for Rapid Recovery

Ransomware: 6 Capabilities You Need for Rapid Recovery

These best practices allow you to have the appropriate safeguards to ensure the delivery of reliable backup and recovery for your critical infrastructure services and to ensure your data will be there when you need it.

Ransomware: 6 Capabilities You Need for Rapid Recovery

These best practices allow you to have the appropriate safeguards to ensure the delivery of reliable backup and recovery for your critical infrastructure services and to ensure your data will be there when you need it.
Veeam
A Pragmatic Path to Passwordless and Phishing Resistance

A Pragmatic Path to Passwordless and Phishing Resistance

While the types of cyberattacks are wide and diverse, 82% of attacks involve a human element, primarily exploiting credentials and phishing.

A Pragmatic Path to Passwordless and Phishing Resistance

While the types of cyberattacks are wide and diverse, 82% of attacks involve a human element, primarily exploiting credentials and phishing.
Axiad
Okta Chooses IRM Over CASB to Avoid Data Leak from Cloud File Sharing

Okta Chooses IRM Over CASB to Avoid Data Leak from Cloud File Sharing

Learn how Okta's security team addressed increasing data risk by prioritizing a data protection initiative that would bolster their control over cloud data.

Okta Chooses IRM Over CASB to Avoid Data Leak from Cloud File Sharing

Learn how Okta's security team addressed increasing data risk by prioritizing a data protection initiative that would bolster their control over cloud data.
Code42 Software
Microsoft 365  and Integrated Cloud Email Security: Transitioning from a SEG to ICES

Microsoft 365 and Integrated Cloud Email Security: Transitioning from a SEG to ICES

Learn how to transitioning from a secure email gateway to integrated cloud email security to meet the demands of the new threat landscape.

Microsoft 365 and Integrated Cloud Email Security: Transitioning from a SEG to ICES

Learn how to transitioning from a secure email gateway to integrated cloud email security to meet the demands of the new threat landscape.
SlashNext
DevSecOps: The Smart Way to Shift Left

DevSecOps: The Smart Way to Shift Left

| Available On-Demand |

DevSecOps: The Smart Way to Shift Left

| Available On-Demand |
Wiz
Endpoint Protection Best Practices to Block Ransomware

Endpoint Protection Best Practices to Block Ransomware

Get practical guidance on configuring your endpoint solution to provide optimum protection.

Endpoint Protection Best Practices to Block Ransomware

Get practical guidance on configuring your endpoint solution to provide optimum protection.
Sophos Inc.
Proof-Based Scanning: No noise, just facts

Proof-Based Scanning: No noise, just facts

Learn how you can streamline web vulnerability scanning and save valuable resources whilst quickly delivering on your ROI.

Proof-Based Scanning: No noise, just facts

Learn how you can streamline web vulnerability scanning and save valuable resources whilst quickly delivering on your ROI.
Invicti
Large Insurer goes beyond Breach and Attack Simulation (BAS) with Cymulate

Large Insurer goes beyond Breach and Attack Simulation (BAS) with Cymulate

With 38 branches and more than BRL 6.5 million in customers, one of the largest insurance companies in Brazil implemented a continuous security validation strategy, but their BAS tool was not comprehensive or easy to automate.

Large Insurer goes beyond Breach and Attack Simulation (BAS) with Cymulate

With 38 branches and more than BRL 6.5 million in customers, one of the largest insurance companies in Brazil implemented a continuous security validation strategy, but their BAS tool was not comprehensive or easy to automate.
Cymulate
The 3 Approaches to Breach & Attack Simulation Technologies.

The 3 Approaches to Breach & Attack Simulation Technologies.

Testing the cybersecurity posture of an organization or its cybersecurity resilience to cyberattacks has come a long way. Demand for the latest and most comprehensive testing solutions continues to grow to counter the ever-increasing wave of cybercrime.

The 3 Approaches to Breach & Attack Simulation Technologies.

Testing the cybersecurity posture of an organization or its cybersecurity resilience to cyberattacks has come a long way. Demand for the latest and most comprehensive testing solutions continues to grow to counter the ever-increasing wave of cybercrime.
Cymulate
Understanding Vulnerability Prioritization Technologies - From Generic VM to VPT

Understanding Vulnerability Prioritization Technologies - From Generic VM to VPT

The precision of identifying the risk extent is in direct correlation with the scope of the data input the VPT can access and process, ranging from CVSS score to business risk evaluation and technological context.

Understanding Vulnerability Prioritization Technologies - From Generic VM to VPT

The precision of identifying the risk extent is in direct correlation with the scope of the data input the VPT can access and process, ranging from CVSS score to business risk evaluation and technological context.
Cymulate
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.