Cybersecurity Resource Library

The #1 source for free Cybersecurity reports, whitepapers, webinars, research and more.

Showing results 241 - 270 of 952
Showing results 241 - 270 of 952

Filter by

Filters

Endpoint Best Practices to Block Ransomware

Endpoint Best Practices to Block Ransomware

Practical guidance on configuring your endpoint solution to provide optimum protection

Endpoint Best Practices to Block Ransomware

Practical guidance on configuring your endpoint solution to provide optimum protection
Sophos Inc.
Incident Response Planning Guide

Incident Response Planning Guide

Discover the latest cybersecurity landscape and how you can reduce cyber risk, increase efficiency and impact of security investments, and improve insurability with MDR.

Incident Response Planning Guide

Discover the latest cybersecurity landscape and how you can reduce cyber risk, increase efficiency and impact of security investments, and improve insurability with MDR.
Sophos Inc.
Stopping Active Adversaries: Lessons from the Cyber Frontline

Stopping Active Adversaries: Lessons from the Cyber Frontline

Get key learnings and actionable insights for your security strategy based on 232 major cyber incidents remediated by Sophos X-Ops incident response.

Stopping Active Adversaries: Lessons from the Cyber Frontline

Get key learnings and actionable insights for your security strategy based on 232 major cyber incidents remediated by Sophos X-Ops incident response.
Sophos Inc.
Strengthen Microsoft Defender with MDR

Strengthen Microsoft Defender with MDR

Stopping advanced ransomware attacks and breaches with Microsoft Defender requires 24/7 human-led detection and response. Find out how your organization can benefit with MDR today.

Strengthen Microsoft Defender with MDR

Stopping advanced ransomware attacks and breaches with Microsoft Defender requires 24/7 human-led detection and response. Find out how your organization can benefit with MDR today.
Sophos Inc.
Top Cloud Security Threats Targeting Today's Enterprises

Top Cloud Security Threats Targeting Today's Enterprises

| Live Webinar | Thursday, February 8, 2024 | 1pm ET |

Top Cloud Security Threats Targeting Today's Enterprises

| Live Webinar | Thursday, February 8, 2024 | 1pm ET |
Darktrace
Winter 2024 G2 Grid Report: Best IT Risk Management Software

Winter 2024 G2 Grid Report: Best IT Risk Management Software

Not all IT Risk Management Software solutions are created equal.

Winter 2024 G2 Grid Report: Best IT Risk Management Software

Not all IT Risk Management Software solutions are created equal.
AuditBoard
Winter 2024 G2 Grid Report: Best Third Party & Supplier Risk Management Software

Winter 2024 G2 Grid Report: Best Third Party & Supplier Risk Management Software

Not all Third Party Risk Management Software solutions are created equal.

Winter 2024 G2 Grid Report: Best Third Party & Supplier Risk Management Software

Not all Third Party Risk Management Software solutions are created equal.
AuditBoard
How Enterprise Are Responding to the Incident Response Challenge

How Enterprise Are Responding to the Incident Response Challenge

Many organizations bolstered their incident response capabilities last year to address a wide and growing range of security threats to their IT environments. The efforts drove an increase in the number of organizations that have an established security operations center, dedicated security staff, and full-fledged incident response teams. Many have established security operations centers and have a dedicated incident response team to address a continuing increase in reported security incidents.

How Enterprise Are Responding to the Incident Response Challenge

Many organizations bolstered their incident response capabilities last year to address a wide and growing range of security threats to their IT environments. The efforts drove an increase in the number of organizations that have an established security operations center, dedicated security staff, and full-fledged incident response teams. Many have established security operations centers and have a dedicated incident response team to address a continuing increase in reported security incidents.
Dark Reading
How Enterprises Assess Their Cyber-Risk

How Enterprises Assess Their Cyber-Risk

Organizations have deployed an array of controls for managing cyber-risks as they deal with a complex landscape of threats.  While cloud and remote workforce issues dominate the  agenda, these are just two of the ever-increasing number of  cyber-risks at modern enterprise organizations

How Enterprises Assess Their Cyber-Risk

Organizations have deployed an array of controls for managing cyber-risks as they deal with a complex landscape of threats.  While cloud and remote workforce issues dominate the  agenda, these are just two of the ever-increasing number of  cyber-risks at modern enterprise organizations
Orca
Industrial Networks in the Age of Digitalization

Industrial Networks in the Age of Digitalization

Now more than ever, increasingly connected operational technology (OT) networks face real cyber threats -- and a generation of new industrial control system (ICS)/OT security products and services aims to fill the security gaps.

Industrial Networks in the Age of Digitalization

Now more than ever, increasingly connected operational technology (OT) networks face real cyber threats -- and a generation of new industrial control system (ICS)/OT security products and services aims to fill the security gaps.
Dark Reading
Zero-Trust Adoption Driven by Data Protection, Cloud Access Control, and Regulatory Compliance Requirements

Zero-Trust Adoption Driven by Data Protection, Cloud Access Control, and Regulatory Compliance Requirements

Zero-trust initiatives are a key focus for many companies. Nearly 30% of organizations are already rolling out zero-trust initiatives to control access to their data and assets and more than 80% will have the capability within the next 18 months. Organizations are addressing cybersecurity challenges by enhancing identity and access management, privileged-access management, and data classification. They expect to see budgets for zero-trust initiatives grow modestly over the next 12 months.

Zero-Trust Adoption Driven by Data Protection, Cloud Access Control, and Regulatory Compliance Requirements

Zero-trust initiatives are a key focus for many companies. Nearly 30% of organizations are already rolling out zero-trust initiatives to control access to their data and assets and more than 80% will have the capability within the next 18 months. Organizations are addressing cybersecurity challenges by enhancing identity and access management, privileged-access management, and data classification. They expect to see budgets for zero-trust initiatives grow modestly over the next 12 months.
Dark Reading
Arctic Wolf Labs' 2024 Cybersecurity Predictions

Arctic Wolf Labs' 2024 Cybersecurity Predictions

As we look towards 2024, we know that threat actors will continue to refine their techniques. Use this report, and the predictions and recommendations within, to help secure your organization against these growing and evolving threats.

Arctic Wolf Labs' 2024 Cybersecurity Predictions

As we look towards 2024, we know that threat actors will continue to refine their techniques. Use this report, and the predictions and recommendations within, to help secure your organization against these growing and evolving threats.
Arctic Wolf
DevSecOps: The Smart Way to Shift Left

DevSecOps: The Smart Way to Shift Left

| Live Webinar | Wednesday, February 14, 2024 | 1pm ET |

DevSecOps: The Smart Way to Shift Left

| Live Webinar | Wednesday, February 14, 2024 | 1pm ET |
Palo Alto Networks
The Big Business Of Cybercrime: A Deep Dive Guide

The Big Business Of Cybercrime: A Deep Dive Guide

Cybercrime has become a big business -- an entire ecosystem of organizations run just like yours. This report seeks to enlighten your understanding of cybercrime, including the vast ramifications it entails for your business now and in the future.

The Big Business Of Cybercrime: A Deep Dive Guide

Cybercrime has become a big business -- an entire ecosystem of organizations run just like yours. This report seeks to enlighten your understanding of cybercrime, including the vast ramifications it entails for your business now and in the future.
Arctic Wolf
The Human - AI Partnership

The Human - AI Partnership

What does the future hold for AI? See our full report for our insights, predictions, and what 800+ industry leaders think will happen next and how emerging technology may empower the next generation of security operations.

The Human - AI Partnership

What does the future hold for AI? See our full report for our insights, predictions, and what 800+ industry leaders think will happen next and how emerging technology may empower the next generation of security operations.
Arctic Wolf
SecOps and DevSecOps in the Cloud

SecOps and DevSecOps in the Cloud

This is an executive summary of the "SecOps & DevSecOps in the Cloud" webinar that took place December 14th, 2023. The speakers were Dr. Jason Clark, independent security researcher, and Charles Goldberg, Sr. Director, Product Marketing at Palo Alto Networks. The webinar was moderated by Becky Bracken, editor at Dark Reading.

SecOps and DevSecOps in the Cloud

This is an executive summary of the "SecOps & DevSecOps in the Cloud" webinar that took place December 14th, 2023. The speakers were Dr. Jason Clark, independent security researcher, and Charles Goldberg, Sr. Director, Product Marketing at Palo Alto Networks. The webinar was moderated by Becky Bracken, editor at Dark Reading.
Palo Alto Networks
Tips for Managing Cloud Security in a Hybrid Environment

Tips for Managing Cloud Security in a Hybrid Environment

| Live Webinar | Thursday, February 1, 2024 | 1pm ET |

Tips for Managing Cloud Security in a Hybrid Environment

| Live Webinar | Thursday, February 1, 2024 | 1pm ET |
Wiz
The InfoSec Survival Guide

The InfoSec Survival Guide

Today, security and compliance leaders are struggling under the pressure of maintaining ongoing compliance in the face of regulatory expansion, changing requirements, technical transformation, explosions of scale (data, users, assets), and the battle for talent. In the face of these encroaching demands, InfoSec professionals are in dire need of a new approach to compliance.

The InfoSec Survival Guide

Today, security and compliance leaders are struggling under the pressure of maintaining ongoing compliance in the face of regulatory expansion, changing requirements, technical transformation, explosions of scale (data, users, assets), and the battle for talent. In the face of these encroaching demands, InfoSec professionals are in dire need of a new approach to compliance.
AuditBoard
Threat Intelligence: Eyes on the Enemy

Threat Intelligence: Eyes on the Enemy

Threat intelligence is the gold standard for 21st-century cybersecurity. However, today's IT teams are overwhelmed by phishing scams, social engineering hacks, failures in managing third-party risks, and more. New research from CyberRisk Alliance and sponsored by AuditBoard, Threat Intelligence: Eyes on the Enemy examines critical steps for all organizations to equip themselves to handle the next generation of threats.

Threat Intelligence: Eyes on the Enemy

Threat intelligence is the gold standard for 21st-century cybersecurity. However, today's IT teams are overwhelmed by phishing scams, social engineering hacks, failures in managing third-party risks, and more. New research from CyberRisk Alliance and sponsored by AuditBoard, Threat Intelligence: Eyes on the Enemy examines critical steps for all organizations to equip themselves to handle the next generation of threats.
AuditBoard
Your Complete Guide to the New SEC Cybersecurity Rules

Your Complete Guide to the New SEC Cybersecurity Rules

In an effort to address the rise in cyber breaches, the U.S. Securities and Exchange Commission has released new cybersecurity disclosure requirements for public companies. Get a comprehensive guide to help you navigate the new rules, including key dates, an overview of the requirements, and steps to prepare.

Your Complete Guide to the New SEC Cybersecurity Rules

In an effort to address the rise in cyber breaches, the U.S. Securities and Exchange Commission has released new cybersecurity disclosure requirements for public companies. Get a comprehensive guide to help you navigate the new rules, including key dates, an overview of the requirements, and steps to prepare.
AuditBoard
Cybersecurity Isn't Enough

Cybersecurity Isn't Enough

Cybersecurity Isn’t Enough - The Information Security Ecosystem Dies Without External Data Privacy

Cybersecurity Isn't Enough

Cybersecurity Isn’t Enough - The Information Security Ecosystem Dies Without External Data Privacy
Privacy Bee
Mitigating Exposed PII

Mitigating Exposed PII

Mitigating Exposed PII Dramatically Lowers Risk of Data Breach via Social Engineering

Mitigating Exposed PII

Mitigating Exposed PII Dramatically Lowers Risk of Data Breach via Social Engineering
Privacy Bee
Where Data Privacy And Cybersecurity Intersect

Where Data Privacy And Cybersecurity Intersect

Where Data Privacy and Cybersecurity Intersect (and Don’t)

Where Data Privacy And Cybersecurity Intersect

Where Data Privacy and Cybersecurity Intersect (and Don’t)
Privacy Bee
Arctic Wolf Labs' 2024 Cybersecurity Predictions

Arctic Wolf Labs' 2024 Cybersecurity Predictions

As we look towards 2024, we know that threat actors will continue to refine their techniques. Use this report, and the predictions and recommendations within, to help secure your organization against these growing and evolving threats.

Arctic Wolf Labs' 2024 Cybersecurity Predictions

As we look towards 2024, we know that threat actors will continue to refine their techniques. Use this report, and the predictions and recommendations within, to help secure your organization against these growing and evolving threats.
Arctic Wolf
The Big Business Of Cybercrime: A Deep Dive Guide

The Big Business Of Cybercrime: A Deep Dive Guide

Cybercrime has become a big business -- an entire ecosystem of organizations run just like yours. This report seeks to enlighten your understanding of cybercrime, including the vast ramifications it entails for your business now and in the future.

The Big Business Of Cybercrime: A Deep Dive Guide

Cybercrime has become a big business -- an entire ecosystem of organizations run just like yours. This report seeks to enlighten your understanding of cybercrime, including the vast ramifications it entails for your business now and in the future.
Arctic Wolf
The Human - AI Partnership

The Human - AI Partnership

What does the future hold for AI? See our full report for our insights, predictions, and what 800+ industry leaders think will happen next and how emerging technology may empower the next generation of security operations.

The Human - AI Partnership

What does the future hold for AI? See our full report for our insights, predictions, and what 800+ industry leaders think will happen next and how emerging technology may empower the next generation of security operations.
Arctic Wolf
The Keys to Successfully Securing Cloud-Native Environments

The Keys to Successfully Securing Cloud-Native Environments

As the use of cloud computing rises, so does the complexity of these environments and the volume of attacks targeting cloud systems. As the ability to spin up infrastructure becomes more decentralized, a new generation of vulnerabilities and risks are created in misdelivery, misconfiguration, and publishing errors. This is the world enterprise security teams find themselves as they work to secure their cloud systems. Here is how to secure cloud-native systems and development pipelines.

The Keys to Successfully Securing Cloud-Native Environments

As the use of cloud computing rises, so does the complexity of these environments and the volume of attacks targeting cloud systems. As the ability to spin up infrastructure becomes more decentralized, a new generation of vulnerabilities and risks are created in misdelivery, misconfiguration, and publishing errors. This is the world enterprise security teams find themselves as they work to secure their cloud systems. Here is how to secure cloud-native systems and development pipelines.
Palo Alto Networks
Elevating Your Data Security Game: Strengthening Your Security Posture Against Cyber Threats

Elevating Your Data Security Game: Strengthening Your Security Posture Against Cyber Threats

Available On-Demand

Elevating Your Data Security Game: Strengthening Your Security Posture Against Cyber Threats

Available On-Demand
Rubrik
The State of Generative AI in the Enterprise

The State of Generative AI in the Enterprise

With the sudden increase in organizations embracing generative AI tools, cybersecurity professionals are employing multiple strategies to mitigate risks to privacy, security, and regulatory compliance issues.

The State of Generative AI in the Enterprise

With the sudden increase in organizations embracing generative AI tools, cybersecurity professionals are employing multiple strategies to mitigate risks to privacy, security, and regulatory compliance issues.
Blink Ops
Finding Issues that Matter in Open Source Dependencies and Fixing them Without Developer Friction

Finding Issues that Matter in Open Source Dependencies and Fixing them Without Developer Friction

Available On-Demand

Finding Issues that Matter in Open Source Dependencies and Fixing them Without Developer Friction

Available On-Demand
Semgrep
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.