Cybersecurity Resource Library

The #1 source for free Cybersecurity reports, whitepapers, webinars, research and more.

Showing results 211 - 240 of 287
Showing results 211 - 240 of 287

Filter by

Filters

How to Defend Against Third-Party Ransomware Attacks

How to Defend Against Third-Party Ransomware Attacks

7 steps to mitigate risk, avoid data breaches and keep your organization secure

How to Defend Against Third-Party Ransomware Attacks

7 steps to mitigate risk, avoid data breaches and keep your organization secure
ProcessUnity
Hybrid IT and the 7 Major Challenges That Impede Digital Acceleration

Hybrid IT and the 7 Major Challenges That Impede Digital Acceleration

In today’s digital marketplace, speed and availability are essential

Hybrid IT and the 7 Major Challenges That Impede Digital Acceleration

In today’s digital marketplace, speed and availability are essential
Fortinet
Proactive Preparation and Hardening to Protect Against Destructive Attacks

Proactive Preparation and Hardening to Protect Against Destructive Attacks

Leveraging Mandiant Attack Surface Management or a thirdparty vulnerability scanning technology to identify assets and associated vulnerabilities.

Proactive Preparation and Hardening to Protect Against Destructive Attacks

Leveraging Mandiant Attack Surface Management or a thirdparty vulnerability scanning technology to identify assets and associated vulnerabilities.
Mandiant
Ready or Not: A Ransomware Self-Assessment

Ready or Not: A Ransomware Self-Assessment

Starting with the end goal in mind is the best recommendation for deciding which offensive security program will work best for your organization.

Ready or Not: A Ransomware Self-Assessment

Starting with the end goal in mind is the best recommendation for deciding which offensive security program will work best for your organization.
BishopFox
Remediation and Hardening Strategies for Microsoft 365 to Defend Against APT29

Remediation and Hardening Strategies for Microsoft 365 to Defend Against APT29

Attacker Tactics, Techniques and Procedures (TTPs)

Remediation and Hardening Strategies for Microsoft 365 to Defend Against APT29

Attacker Tactics, Techniques and Procedures (TTPs)
Mandiant
Seven Ways to Avoid the Nightmare of a Cloud Misconfiguration Attack

Seven Ways to Avoid the Nightmare of a Cloud Misconfiguration Attack

Misconfiguration is 100% the result of human error.

Seven Ways to Avoid the Nightmare of a Cloud Misconfiguration Attack

Misconfiguration is 100% the result of human error.
Snyk
Software Vulnerability Snapshot Report

Software Vulnerability Snapshot Report

An Analysis by Synopsys Application Security Testing Services

Software Vulnerability Snapshot Report

An Analysis by Synopsys Application Security Testing Services
WhiteHat Security
State of Email Security

State of Email Security

Confronting the new wave of cyberattacks

State of Email Security

Confronting the new wave of cyberattacks
Mimecast
State of Ransomware Readiness: Facing the Reality Gap

State of Ransomware Readiness: Facing the Reality Gap

Awareness of ransomware and the risk it poses has accelerated dramaticallyin recent months.

State of Ransomware Readiness: Facing the Reality Gap

Awareness of ransomware and the risk it poses has accelerated dramaticallyin recent months.
Mimecast
The 2022 State of Cloud Security Report

The 2022 State of Cloud Security Report

A Report on the Cloud Risks and Security Challenges Organizations are Experiencing in 2022

The 2022 State of Cloud Security Report

A Report on the Cloud Risks and Security Challenges Organizations are Experiencing in 2022
Snyk
The Five Fundamentals of Cloud Security

The Five Fundamentals of Cloud Security

Knowing how developers are building and maintaining cloud environments means you can start empowering them to do so securely, right from the start

The Five Fundamentals of Cloud Security

Knowing how developers are building and maintaining cloud environments means you can start empowering them to do so securely, right from the start
Snyk
The Importance Adopting DevSecOps

The Importance Adopting DevSecOps

While security is "everyone's responsibility", DevOps teams are uniquely positioned at the intersection of development and operations, empowered to apply security in both breadth and depth.

The Importance Adopting DevSecOps

While security is "everyone's responsibility", DevOps teams are uniquely positioned at the intersection of development and operations, empowered to apply security in both breadth and depth.
Snyk
WhiteHat DAST Data Sheet

WhiteHat DAST Data Sheet

Web application security for modern and traditional web frameworks and applications

WhiteHat DAST Data Sheet

Web application security for modern and traditional web frameworks and applications
WhiteHat Security
Work From Anywhere Doesn't Have To Be Complicated

Work From Anywhere Doesn't Have To Be Complicated

Provide Consistent Security No Matter Where Users Are Located

Work From Anywhere Doesn't Have To Be Complicated

Provide Consistent Security No Matter Where Users Are Located
Fortinet
2021 Cyber Threats to Public Safety: Criminal Operations

2021 Cyber Threats to Public Safety: Criminal Operations

Insights from the Motorola Solutions Threat Intelligence Team - Second in a Series

2021 Cyber Threats to Public Safety: Criminal Operations

Insights from the Motorola Solutions Threat Intelligence Team - Second in a Series
Motorola
2022 Cyber Predictions

2022 Cyber Predictions

Here are 11 predictions from Cymulate’s cyber-security experts.

2022 Cyber Predictions

Here are 11 predictions from Cymulate’s cyber-security experts.
Cymulate
3 Approaches to Breach and Attack Simulation

3 Approaches to Breach and Attack Simulation

Read Now

3 Approaches to Breach and Attack Simulation

Read Now
Cymulate
A Case for Evaluating Security After the Cloud Rush

A Case for Evaluating Security After the Cloud Rush

CBI helps organization gain visibility into its cloud security status

A Case for Evaluating Security After the Cloud Rush

CBI helps organization gain visibility into its cloud security status
CreativeBreakthroughs
A Case for Secure-by-Design Cloud Transformation

A Case for Secure-by-Design Cloud Transformation

CBI guides organization on a secure journey to 100% cloud-hosted data centers

A Case for Secure-by-Design Cloud Transformation

CBI guides organization on a secure journey to 100% cloud-hosted data centers
CreativeBreakthroughs
A Detailed Comparison: ZTNA vs On-Premises Firewall VPN

A Detailed Comparison: ZTNA vs On-Premises Firewall VPN

Securing Today’s Remote Workspaces

A Detailed Comparison: ZTNA vs On-Premises Firewall VPN

Securing Today’s Remote Workspaces
Perimeter 81
A Perfect Storm for Social Engineering: Anticipating the Human Factor in Post-Pandemic Cybersecurity

A Perfect Storm for Social Engineering: Anticipating the Human Factor in Post-Pandemic Cybersecurity

Human factors and the human-computer interface are central component of cybersecurity

A Perfect Storm for Social Engineering: Anticipating the Human Factor in Post-Pandemic Cybersecurity

Human factors and the human-computer interface are central component of cybersecurity
Abnormal Security
A Practical Guide for Shields Up - For Organizations

A Practical Guide for Shields Up - For Organizations

Advice for Organizations in Implementing CISA’s Cybersecurity Doctrine to Defend your Enterprise

A Practical Guide for Shields Up - For Organizations

Advice for Organizations in Implementing CISA’s Cybersecurity Doctrine to Defend your Enterprise
ExtraHop
A Zero Trust Approach to Secure Access

A Zero Trust Approach to Secure Access

Protecting Privileged Access for All Remote Sessions

A Zero Trust Approach to Secure Access

Protecting Privileged Access for All Remote Sessions
BeyondTrust
Applying Zero Trust Principles to Devices

Applying Zero Trust Principles to Devices

Seven Best Practices to Protect Critical IT Resources from Vulnerable Devices

Applying Zero Trust Principles to Devices

Seven Best Practices to Protect Critical IT Resources from Vulnerable Devices
Infinipoint
Augmenting Your Microsoft 365 EOP and MDO Email Security Infrastructure

Augmenting Your Microsoft 365 EOP and MDO Email Security Infrastructure

In today’s cloud-first approach to managing corporate infrastructure and running applications, more than 56% of global organizations use Microsoft for email.

Augmenting Your Microsoft 365 EOP and MDO Email Security Infrastructure

In today’s cloud-first approach to managing corporate infrastructure and running applications, more than 56% of global organizations use Microsoft for email.
Abnormal Security
Automated Pen Testing vs Breach and Attack Simulation

Automated Pen Testing vs Breach and Attack Simulation

Ask the Right Questions, Get the Best Answers

Automated Pen Testing vs Breach and Attack Simulation

Ask the Right Questions, Get the Best Answers
Cymulate
BotGuard for Applications Higher Education Case Study

BotGuard for Applications Higher Education Case Study

Security Team, Ping and HUMAN Collaborate to Protect Single-Sign-On at a Leading University

BotGuard for Applications Higher Education Case Study

Security Team, Ping and HUMAN Collaborate to Protect Single-Sign-On at a Leading University
HUMAN Security
BotGuard for Denial of Inventory & Stockouts

BotGuard for Denial of Inventory & Stockouts

Are Sophisticated Bots Cashing Out On Your Customer Experience?

BotGuard for Denial of Inventory & Stockouts

Are Sophisticated Bots Cashing Out On Your Customer Experience?
HUMAN Security
BotGuard for Streaming Service Case Study

BotGuard for Streaming Service Case Study

Let Product Teams Stay Focused on Delighting Customers

BotGuard for Streaming Service Case Study

Let Product Teams Stay Focused on Delighting Customers
HUMAN Security
BotGuard Supplements CDN and WAF Case Study

BotGuard Supplements CDN and WAF Case Study

CDN and WAF solutions protect against simple bot fraud, but is it enough?

BotGuard Supplements CDN and WAF Case Study

CDN and WAF solutions protect against simple bot fraud, but is it enough?
HUMAN Security
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.