Cybersecurity Resource Library

The #1 source for free Cybersecurity reports, whitepapers, webinars, research and more.

Showing results 181 - 210 of 287
Showing results 181 - 210 of 287

Filter by

Filters

Guide to Open Source Software Security

Guide to Open Source Software Security

How to gain visibility to all your security risks

Guide to Open Source Software Security

How to gain visibility to all your security risks
Mend
The Importance of SBOMs in Protecting the Software Supply Chain

The Importance of SBOMs in Protecting the Software Supply Chain

Learn how to use SBOMs to better track and fix known and newly emerging vulnerabilities to keep your applications secure.

The Importance of SBOMs in Protecting the Software Supply Chain

Learn how to use SBOMs to better track and fix known and newly emerging vulnerabilities to keep your applications secure.
Mend
Analyzing the Economic Benefits of Microsoft Defender for IoT

Analyzing the Economic Benefits of Microsoft Defender for IoT

Operational technology (OT) networks are the backbone of industrial and critical infrastructure organizations around the world

Analyzing the Economic Benefits of Microsoft Defender for IoT

Operational technology (OT) networks are the backbone of industrial and critical infrastructure organizations around the world
Microsoft
Building Operational Resilience in Industrial & Critical Infrastructure

Building Operational Resilience in Industrial & Critical Infrastructure

Continuous asset management and threat monitoring for your OT devices

Building Operational Resilience in Industrial & Critical Infrastructure

Continuous asset management and threat monitoring for your OT devices
Microsoft
Microsoft 365 and Integrated Cloud Email Security: Transitioning from a SEG to ICES

Microsoft 365 and Integrated Cloud Email Security: Transitioning from a SEG to ICES

Transitioning from a Secure Email Gateway to Modern Architecture for the Modern Enterprise

Microsoft 365 and Integrated Cloud Email Security: Transitioning from a SEG to ICES

Transitioning from a Secure Email Gateway to Modern Architecture for the Modern Enterprise
SlashNext
Ransomware in Focus: New Research on CISO Perceptions, Perspectives, and Plans

Ransomware in Focus: New Research on CISO Perceptions, Perspectives, and Plans

As the ransomware problem continues to worsen and the ability to obtain and/or maintain insurance coverage becomes increasingly problematic, shoring up technical defenses is a necessity.

Ransomware in Focus: New Research on CISO Perceptions, Perspectives, and Plans

As the ransomware problem continues to worsen and the ability to obtain and/or maintain insurance coverage becomes increasingly problematic, shoring up technical defenses is a necessity.
Zscaler
Software Supply Chain Security Best Practices Guide

Software Supply Chain Security Best Practices Guide

Read Now

Software Supply Chain Security Best Practices Guide

Read Now
Legit Security
The 3 Riskiest Software Supply Chain Attack Patterns

The 3 Riskiest Software Supply Chain Attack Patterns

With Tips To Reduce Your Risk

The 3 Riskiest Software Supply Chain Attack Patterns

With Tips To Reduce Your Risk
Legit Security
2022 Cyber Threat Landscape Report

2022 Cyber Threat Landscape Report

The rise of supply chain attacks.

2022 Cyber Threat Landscape Report

The rise of supply chain attacks.
Deep Instinct
An Ounce of Prevention is Worth a Pound of Cure

An Ounce of Prevention is Worth a Pound of Cure

OneBlood began noticing issues associated with its existing endpoint security solution.

An Ounce of Prevention is Worth a Pound of Cure

OneBlood began noticing issues associated with its existing endpoint security solution.
Deep Instinct
Endpoint Security Buyers Guide

Endpoint Security Buyers Guide

As cyber threats become ever more complex, the pressure to have the right endpoint solution in place has also grown.

Endpoint Security Buyers Guide

As cyber threats become ever more complex, the pressure to have the right endpoint solution in place has also grown.
Sophos
Extended Detection and Response (XDR) - Beginner's Guide

Extended Detection and Response (XDR) - Beginner's Guide

XDR is designed to give organizations a holistic view of their cybersecurity posture and IT environment with the ability to quickly pivot to deep investigation when further investigation is required.

Extended Detection and Response (XDR) - Beginner's Guide

XDR is designed to give organizations a holistic view of their cybersecurity posture and IT environment with the ability to quickly pivot to deep investigation when further investigation is required.
Sophos
Five Principles of Modern Application Security Programs

Five Principles of Modern Application Security Programs

Companies of all sizes and across all industries and geographies have one unfortunate thing in common: They’re prime targets for cyberattacks.

Five Principles of Modern Application Security Programs

Companies of all sizes and across all industries and geographies have one unfortunate thing in common: They’re prime targets for cyberattacks.
Mend
Getting Started with Threat Hunting

Getting Started with Threat Hunting

Practical guidance on preparing to search for and neutralize elusive cyber threats

Getting Started with Threat Hunting

Practical guidance on preparing to search for and neutralize elusive cyber threats
Sophos
How to Build a Successful AppSec Program

How to Build a Successful AppSec Program

Enterprise Web Application Security Best Practices

How to Build a Successful AppSec Program

Enterprise Web Application Security Best Practices
Invicti
Invicti's 2022 ESG Report: Automated Application Security Testing for Faster Development

Invicti's 2022 ESG Report: Automated Application Security Testing for Faster Development

Automated Application Security Testing that Increases Efficiency across the Software Development Lifecycle

Invicti's 2022 ESG Report: Automated Application Security Testing for Faster Development

Automated Application Security Testing that Increases Efficiency across the Software Development Lifecycle
Invicti
Managed Detection and Response (MDR) Services Buyers Guide

Managed Detection and Response (MDR) Services Buyers Guide

This guide provides clarity by walking you through the key considerations when choosing an MDR service.

Managed Detection and Response (MDR) Services Buyers Guide

This guide provides clarity by walking you through the key considerations when choosing an MDR service.
Sophos
OneBlood Case Study

OneBlood Case Study

An Ounce of Prevention is Worth a Pound of Cure.

OneBlood Case Study

An Ounce of Prevention is Worth a Pound of Cure.
Deep Instinct
The Devil  in The Details:  The Importance of SBOMs  in Protecting the Software  Supply Chain

The Devil in The Details: The Importance of SBOMs in Protecting the Software Supply Chain

In order to mitigate open source risks, it’s essential to remediate open source vulnerabilities as soon as they are discovered.

The Devil in The Details: The Importance of SBOMs in Protecting the Software Supply Chain

In order to mitigate open source risks, it’s essential to remediate open source vulnerabilities as soon as they are discovered.
Mend
Voice of SecOps 2021, 2nd Edition

Voice of SecOps 2021, 2nd Edition

The Perception of Threat Prevention

Voice of SecOps 2021, 2nd Edition

The Perception of Threat Prevention
Deep Instinct
2022 SonicWall Cyber Threat Report

2022 SonicWall Cyber Threat Report

Proactive Defense is the Future of Cybersecurity

2022 SonicWall Cyber Threat Report

Proactive Defense is the Future of Cybersecurity
SonicWall
A Requirements-Driven Approach to Cyber Threat Intelligence

A Requirements-Driven Approach to Cyber Threat Intelligence

Structured and repeatable processes should underpin the creation and maintenance of intelligence requirements.

A Requirements-Driven Approach to Cyber Threat Intelligence

Structured and repeatable processes should underpin the creation and maintenance of intelligence requirements.
Mandiant
Aligning Internal Cybersecurity Practices with External Third-Party Risk Management

Aligning Internal Cybersecurity Practices with External Third-Party Risk Management

Recent trends indicate that it’s no longer enough to only address cybersecurity internally.

Aligning Internal Cybersecurity Practices with External Third-Party Risk Management

Recent trends indicate that it’s no longer enough to only address cybersecurity internally.
ProcessUnity
Best Practices for Ongoing Vendor Monitoring

Best Practices for Ongoing Vendor Monitoring

Tips for Continuously Monitoring Your Vendor Landscape

Best Practices for Ongoing Vendor Monitoring

Tips for Continuously Monitoring Your Vendor Landscape
ProcessUnity
Create A Sustainable Cybersecurity Program with Security Control Frameworks

Create A Sustainable Cybersecurity Program with Security Control Frameworks

Build a Control-Centered Universe for Next-Level Cybersecurity Program Management

Create A Sustainable Cybersecurity Program with Security Control Frameworks

Build a Control-Centered Universe for Next-Level Cybersecurity Program Management
ProcessUnity
Determine your Cyber Security Risk with Repurposed Ransomware

Determine your Cyber Security Risk with Repurposed Ransomware

The Serious Threat of Ransomware

Determine your Cyber Security Risk with Repurposed Ransomware

The Serious Threat of Ransomware
Mandiant
Developer-First Security Tools Buyers Guide

Developer-First Security Tools Buyers Guide

As we talk to leaders within IT organizations, it’s clear that there is a need to push security earlier in the cloud environment design process.

Developer-First Security Tools Buyers Guide

As we talk to leaders within IT organizations, it’s clear that there is a need to push security earlier in the cloud environment design process.
Snyk
Developer-Focused Security from Code to Cloud and Back to Code

Developer-Focused Security from Code to Cloud and Back to Code

Discover the importance of application security and cloud security teams working together to deliver more secure cloud native applications in this white paper.

Developer-Focused Security from Code to Cloud and Back to Code

Discover the importance of application security and cloud security teams working together to deliver more secure cloud native applications in this white paper.
Snyk
Five Keys to a Secure Work-From-Anywhere Solution

Five Keys to a Secure Work-From-Anywhere Solution

As organizations adopt hybrid work, they need to extend security to employees no matter where they may be located.

Five Keys to a Secure Work-From-Anywhere Solution

As organizations adopt hybrid work, they need to extend security to employees no matter where they may be located.
Fortinet
Honest Security

Honest Security

" Splendid-- Inform the compliance team we’ve reduced the risk of fire".

Honest Security

" Splendid-- Inform the compliance team we’ve reduced the risk of fire".
Kolide
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.