Cybersecurity Resource Library

The #1 source for free Cybersecurity reports, whitepapers, webinars, research and more.

Showing results 241 - 270 of 287
Showing results 241 - 270 of 287

Filter by

Filters

Bridging the Gap between DevOps and SecOps

Bridging the Gap between DevOps and SecOps

According to NTT AppSec Stats Flash Report, 85% of vulnerabilities that organizations find this year will never be remediated.

Bridging the Gap between DevOps and SecOps

According to NTT AppSec Stats Flash Report, 85% of vulnerabilities that organizations find this year will never be remediated.
WhiteHat Security
CISO Guide to Business Email Compromise

CISO Guide to Business Email Compromise

How to Stop the $2.4 Billion Problem

CISO Guide to Business Email Compromise

How to Stop the $2.4 Billion Problem
Abnormal Security
CleanINTERNET IoT Overview

CleanINTERNET IoT Overview

For Operational Technology, Industrial Control Systems, IoT & SCADA Environments

CleanINTERNET IoT Overview

For Operational Technology, Industrial Control Systems, IoT & SCADA Environments
Centripetal
Cloud security blind spots (and how to avoid them)

Cloud security blind spots (and how to avoid them)

Before choosing a cloud service offering, it is important to be aware of common security traps companies fall into.

Cloud security blind spots (and how to avoid them)

Before choosing a cloud service offering, it is important to be aware of common security traps companies fall into.
Vulcan Cyber
Cortex XSOAR - IDC Security Automation Maturity Model

Cortex XSOAR - IDC Security Automation Maturity Model

Over the years, SecOps teams have evolved as the issues they face evolve

Cortex XSOAR - IDC Security Automation Maturity Model

Over the years, SecOps teams have evolved as the issues they face evolve
Palo Alto Networks
Cyber Attack Simulations vs Pen Testing vs Vulnerability Scanning

Cyber Attack Simulations vs Pen Testing vs Vulnerability Scanning

How Targeted Cyberattack Simulations Differ from Penetration Tests & Vulnerability Scanning

Cyber Attack Simulations vs Pen Testing vs Vulnerability Scanning

How Targeted Cyberattack Simulations Differ from Penetration Tests & Vulnerability Scanning
Cymulate
CyberArk Privileged Access Management Solutions

CyberArk Privileged Access Management Solutions

The industry’s most complete solution to reduce risk created by privileged identities, credentials and secrets

CyberArk Privileged Access Management Solutions

The industry’s most complete solution to reduce risk created by privileged identities, credentials and secrets
Optiv
Dark Reading: Close the Visibility Gap

Dark Reading: Close the Visibility Gap

Stopping the New Breed of Advanced Encrypted Threats

Dark Reading: Close the Visibility Gap

Stopping the New Breed of Advanced Encrypted Threats
ExtraHop
Deliver Software Fast and Secure Infrastructure with Zero Trust Access

Deliver Software Fast and Secure Infrastructure with Zero Trust Access

Enforce Identity-Based Access through Cloud IAM, Key Vault Integration.

Deliver Software Fast and Secure Infrastructure with Zero Trust Access

Enforce Identity-Based Access through Cloud IAM, Key Vault Integration.
Appaegis
Deploying enterprise access browser to secure access of contractors and third-parties

Deploying enterprise access browser to secure access of contractors and third-parties

Shifts Driving the Need for A Modified Approach to Secure Cloud Access.

Deploying enterprise access browser to secure access of contractors and third-parties

Shifts Driving the Need for A Modified Approach to Secure Cloud Access.
Appaegis
Device Identity and Security Posture

Device Identity and Security Posture

How to Secure Your Business Services from Insecure Devices

Device Identity and Security Posture

How to Secure Your Business Services from Insecure Devices
Infinipoint
Enterprise Access Browser for Zero Trust Access

Enterprise Access Browser for Zero Trust Access

Security Gaps in a Cloud Centric World.

Enterprise Access Browser for Zero Trust Access

Security Gaps in a Cloud Centric World.
Appaegis
Essential Elements of Device Trust

Essential Elements of Device Trust

Apply Zero Trust to Devices and Fortify Your Enterprise Against Cyberattacks

Essential Elements of Device Trust

Apply Zero Trust to Devices and Fortify Your Enterprise Against Cyberattacks
Infinipoint
False Positives in Web Application Security

False Positives in Web Application Security

As organizations evolve and their web application footprint grows, the number of false positives can rapidly increase and place a serious burden on developers and security teams, with negative consequences for the development process, application security, and business results.

False Positives in Web Application Security

As organizations evolve and their web application footprint grows, the number of false positives can rapidly increase and place a serious burden on developers and security teams, with negative consequences for the development process, application security, and business results.
Invicti
Guide to Preventing JavaScript Supply Chain Attacks

Guide to Preventing JavaScript Supply Chain Attacks

Common Code. Common Challenges.

Guide to Preventing JavaScript Supply Chain Attacks

Common Code. Common Challenges.
Feroot
Hacker Secrets Revealed

Hacker Secrets Revealed

Five Lessons Learned from Security Assessments

Hacker Secrets Revealed

Five Lessons Learned from Security Assessments
Motorola
How Dragos Activity Groups Obtain Initial Access into Industrial Environments

How Dragos Activity Groups Obtain Initial Access into Industrial Environments

As the threat landscape continues to evolve with a perpetual influx of new network anomalies and Indicators of Compromise (IOC), prudent defenders must focus on more actionable elements of attack characteristics, such as Tactics, Techniques and Procedures (TTPs).

How Dragos Activity Groups Obtain Initial Access into Industrial Environments

As the threat landscape continues to evolve with a perpetual influx of new network anomalies and Indicators of Compromise (IOC), prudent defenders must focus on more actionable elements of attack characteristics, such as Tactics, Techniques and Procedures (TTPs).
Dragos
How to Build a Successful AppSec Program

How to Build a Successful AppSec Program

Enterprise Web Application Security Best Practices

How to Build a Successful AppSec Program

Enterprise Web Application Security Best Practices
Invicti
How to Plan for Tomorrow's SOC, Today

How to Plan for Tomorrow's SOC, Today

2020 was a year under siege, from COVID-19 and work-from-home realities to sophisticated supply chain attacks like SolarWinds. Through it all, global network infrastructures have never felt more vulnerable.

How to Plan for Tomorrow's SOC, Today

2020 was a year under siege, from COVID-19 and work-from-home realities to sophisticated supply chain attacks like SolarWinds. Through it all, global network infrastructures have never felt more vulnerable.
Palo Alto Networks
How to Simplify Security with a Cybersecurity Mesh Architecture

How to Simplify Security with a Cybersecurity Mesh Architecture

Organizations driving digital acceleration must leverage a broad, integrated, and automated cybersecurity platform as the core foundation of a true CSMA.

How to Simplify Security with a Cybersecurity Mesh Architecture

Organizations driving digital acceleration must leverage a broad, integrated, and automated cybersecurity platform as the core foundation of a true CSMA.
Fortinet
ICS/OT Cybersecurity 2021 Year in Review

ICS/OT Cybersecurity 2021 Year in Review

Download this whitepaper now to read the ICS/OT cybersecurity executive summary.

ICS/OT Cybersecurity 2021 Year in Review

Download this whitepaper now to read the ICS/OT cybersecurity executive summary.
Dragos
Is One-Click-Remediation Intentionally Misleading SOC Teams

Is One-Click-Remediation Intentionally Misleading SOC Teams

An average of 80 percent of successful breaches are new or unknown “zero-day attacks”

Is One-Click-Remediation Intentionally Misleading SOC Teams

An average of 80 percent of successful breaches are new or unknown “zero-day attacks”
MixMode
Leading SaaS Provider Migrates to Secure Cloud Access in 24 Hours

Leading SaaS Provider Migrates to Secure Cloud Access in 24 Hours

An identity-based perimeter that restricts access for all users, applications and cloud infrastructures.

Leading SaaS Provider Migrates to Secure Cloud Access in 24 Hours

An identity-based perimeter that restricts access for all users, applications and cloud infrastructures.
Appaegis
PIPEDREAM: Chernovite's Emerging Malware Targeting Industrial Control Systems

PIPEDREAM: Chernovite's Emerging Malware Targeting Industrial Control Systems

PIPEDREAM is the seventh known Industrial Control Systems (ICS)-specific malware and fifth specifically developed to disrupt industrial processes.

PIPEDREAM: Chernovite's Emerging Malware Targeting Industrial Control Systems

PIPEDREAM is the seventh known Industrial Control Systems (ICS)-specific malware and fifth specifically developed to disrupt industrial processes.
Dragos
Ransomware in Focus: New Research on CISO Perceptions, Perspectives, and Plans

Ransomware in Focus: New Research on CISO Perceptions, Perspectives, and Plans

CISOs recognize ransomware as the #1 threat they face.

Ransomware in Focus: New Research on CISO Perceptions, Perspectives, and Plans

CISOs recognize ransomware as the #1 threat they face.
Zscaler
Reducing Cost By Moving To A Cloud-Native SIEM

Reducing Cost By Moving To A Cloud-Native SIEM

Leveraging cloud services, detection-as-code, and security data lakes to improve security posture and reduce the operational burden of SIEM.

Reducing Cost By Moving To A Cloud-Native SIEM

Leveraging cloud services, detection-as-code, and security data lakes to improve security posture and reduce the operational burden of SIEM.
Panther
SANS 2021 Top New Attacks and Threat Report

SANS 2021 Top New Attacks and Threat Report

This SANS whitepaper begins with a baseline of statistics from reliable sources of breach and malware data and then summarizes SANS instructors’ expert advice from the RSA panel, which details the emerging threats to look out for in 2021 and beyond.

SANS 2021 Top New Attacks and Threat Report

This SANS whitepaper begins with a baseline of statistics from reliable sources of breach and malware data and then summarizes SANS instructors’ expert advice from the RSA panel, which details the emerging threats to look out for in 2021 and beyond.
ExtraHop
Self-Learning Cyber Defense for Financial Services - Intelligence Achieved

Self-Learning Cyber Defense for Financial Services - Intelligence Achieved

MixMode Predicts & Detects Attacks Legacy Platforms Can’t

Self-Learning Cyber Defense for Financial Services - Intelligence Achieved

MixMode Predicts & Detects Attacks Legacy Platforms Can’t
MixMode
Selling Breaches: The Transfer of Enterprise Network Access on Criminal Forums

Selling Breaches: The Transfer of Enterprise Network Access on Criminal Forums

Network compromise drives big business on the dark web. Cybercriminals are actively buying and selling unauthorized network access in a variety of underground forums.

Selling Breaches: The Transfer of Enterprise Network Access on Criminal Forums

Network compromise drives big business on the dark web. Cybercriminals are actively buying and selling unauthorized network access in a variety of underground forums.
Rapid7
Successful Identity Integration During a Merger--and Beyond

Successful Identity Integration During a Merger--and Beyond

Use Case: Mergers and Acquisitions

Successful Identity Integration During a Merger--and Beyond

Use Case: Mergers and Acquisitions
Radiant Logic
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.