Cybersecurity Resource Library

The #1 source for free Cybersecurity reports, whitepapers, webinars, research and more.

Showing results 1 - 30 of 1008
Showing results 1 - 30 of 1008

Filter by

Filters

6 Best Practices for Developer Security in a Financial Services Institution

6 Best Practices for Developer Security in a Financial Services Institution

Developer security best practices for FinServ

6 Best Practices for Developer Security in a Financial Services Institution

Developer security best practices for FinServ
Snyk
Beyond DLP: Embracing the New Necessities of Data Security

Beyond DLP: Embracing the New Necessities of Data Security

Read the eBook to learn why DSPM is a critical component of data security programs in the age of AI, and how organizations are adapting to the changing digital landscape to secure their sensitive data.

Beyond DLP: Embracing the New Necessities of Data Security

Read the eBook to learn why DSPM is a critical component of data security programs in the age of AI, and how organizations are adapting to the changing digital landscape to secure their sensitive data.
Cyera
Case Study: How a multinational pharmaceutical company uses Cyera to improve data security and compliance

Case Study: How a multinational pharmaceutical company uses Cyera to improve data security and compliance

Download the case study to learn how a multinational pharmaceutical company uses Cyera to improve data security and compliance.

Case Study: How a multinational pharmaceutical company uses Cyera to improve data security and compliance

Download the case study to learn how a multinational pharmaceutical company uses Cyera to improve data security and compliance.
Cyera
Cloud Cost Optimization Guide

Cloud Cost Optimization Guide

CISOs must balance the competing demands of improving security, while also consolidating resources. This task is made all the more challenging by business growth which can expand attack surfaces. View this paper to examine how cloud optimization can reduce costs while improving security and compliance.

Cloud Cost Optimization Guide

CISOs must balance the competing demands of improving security, while also consolidating resources. This task is made all the more challenging by business growth which can expand attack surfaces. View this paper to examine how cloud optimization can reduce costs while improving security and compliance.
Cyera
Data and Identity: The Evolving Security Paradigm

Data and Identity: The Evolving Security Paradigm

Data and identity have become the primary targets for cyberattacks, driven by the exponential growth in data volumes and the increasing complexity of identity management.

Data and Identity: The Evolving Security Paradigm

Data and identity have become the primary targets for cyberattacks, driven by the exponential growth in data volumes and the increasing complexity of identity management.
Cyera
DSPM Buyer's Guide

DSPM Buyer's Guide

Download the DSPM Buyer's Guide to learn what to look for in a DSPM solution, key considerations when evaluating DSPM solutions, and how to spot a legacy approach claiming "DSPM".

DSPM Buyer's Guide

Download the DSPM Buyer's Guide to learn what to look for in a DSPM solution, key considerations when evaluating DSPM solutions, and how to spot a legacy approach claiming "DSPM".
Cyera
Optimizing AppSec in the Financial Services Sector

Optimizing AppSec in the Financial Services Sector

A buyer’s guide for meeting the unprecedented speed and complexity of today’s development practices

Optimizing AppSec in the Financial Services Sector

A buyer’s guide for meeting the unprecedented speed and complexity of today’s development practices
Snyk
ASRM Cyberisk

ASRM Cyberisk

Getting under the surface of your Cyber Risk

ASRM Cyberisk

Getting under the surface of your Cyber Risk
Trend Micro, Inc.
ASRM Use Case Risk Prioritization

ASRM Use Case Risk Prioritization

Elevate Your Risk Prioritization & Mitigation

ASRM Use Case Risk Prioritization

Elevate Your Risk Prioritization & Mitigation
Trend Micro, Inc.
IDC Tech Assessment Guide ASRM

IDC Tech Assessment Guide ASRM

Across the Entire Attack Surface: Risk Requires a Platform

IDC Tech Assessment Guide ASRM

Across the Entire Attack Surface: Risk Requires a Platform
Trend Micro, Inc.
Omdia ASM eBook

Omdia ASM eBook

Understanding ASM in the context of Continuous Security Protection

Omdia ASM eBook

Understanding ASM in the context of Continuous Security Protection
Trend Micro, Inc.
Top 5 Things to Know About Cyber Resilience for Network Devices

Top 5 Things to Know About Cyber Resilience for Network Devices

In today's world, cyber resilience is no longer a choice - it's a necessity. Yet, despite growing awareness of its importance, network devices remain a significant vulnerability in many organizations' defenses.

Top 5 Things to Know About Cyber Resilience for Network Devices

In today's world, cyber resilience is no longer a choice - it's a necessity. Yet, despite growing awareness of its importance, network devices remain a significant vulnerability in many organizations' defenses.
BackBox Software
Transforming Network Configuration Management: Challenges and Solutions

Transforming Network Configuration Management: Challenges and Solutions

The traditional Network Configuration Management (NCM) model is no longer fit for purpose: With hybrid networks and increasing complexity on the rise, network teams need innovative solutions to stay ahead.

Transforming Network Configuration Management: Challenges and Solutions

The traditional Network Configuration Management (NCM) model is no longer fit for purpose: With hybrid networks and increasing complexity on the rise, network teams need innovative solutions to stay ahead.
BackBox Software
When Cyber Resilience Lags IT Exploits, Automation is the Answer

When Cyber Resilience Lags IT Exploits, Automation is the Answer

Rapidly evolving cyber threats demand a proactive approach: Cyber Resilience. By prioritizing this strategic imperative, organizations can effectively mitigate risk and ensure business continuity in the face of increasing digital complexity.

When Cyber Resilience Lags IT Exploits, Automation is the Answer

Rapidly evolving cyber threats demand a proactive approach: Cyber Resilience. By prioritizing this strategic imperative, organizations can effectively mitigate risk and ensure business continuity in the face of increasing digital complexity.
BackBox Software
Fireside Chat with Graham Cluley: Known and Unknown Risks of AI Adoption in 2025

Fireside Chat with Graham Cluley: Known and Unknown Risks of AI Adoption in 2025

Wednesday, January 15, 2025 at 1 PM EST

Fireside Chat with Graham Cluley: Known and Unknown Risks of AI Adoption in 2025

Wednesday, January 15, 2025 at 1 PM EST
Rubrik
From Reactive to Proactive: How Allowlisting Turns the Tables on Zero-Day Vulnerabilities

From Reactive to Proactive: How Allowlisting Turns the Tables on Zero-Day Vulnerabilities

This is an executive summary of the “From Reactive to Proactive: How Allowlisting Turns the Tables on Zero-Day Vulnerabilities” webinar that took place October 17th, 2024. The speaker was Rob Allen, Chief Product Officer (CPO), ThreatLocker. The webinar was moderated Jonathan Care, Advisor, Lionfish Tech Advisors (Moderator)

From Reactive to Proactive: How Allowlisting Turns the Tables on Zero-Day Vulnerabilities

This is an executive summary of the “From Reactive to Proactive: How Allowlisting Turns the Tables on Zero-Day Vulnerabilities” webinar that took place October 17th, 2024. The speaker was Rob Allen, Chief Product Officer (CPO), ThreatLocker. The webinar was moderated Jonathan Care, Advisor, Lionfish Tech Advisors (Moderator)
ThreatLocker
100 Critical Security Questions to Address in Your Trust Center

100 Critical Security Questions to Address in Your Trust Center

We analyzed data from hundreds of SafeBase Trust Centers across industries to uncover the top 100 core questions most frequently asked in security reviews.

100 Critical Security Questions to Address in Your Trust Center

We analyzed data from hundreds of SafeBase Trust Centers across industries to uncover the top 100 core questions most frequently asked in security reviews.
SafeBase
The Artificial Future Trend Micro Security Predictions for 2025

The Artificial Future Trend Micro Security Predictions for 2025

Thursday, January 16, 2025 at 1 PM EST

The Artificial Future Trend Micro Security Predictions for 2025

Thursday, January 16, 2025 at 1 PM EST
Trend Micro
Transform Security Reviews and Build Lasting Customer Confidence with a Trust Center

Transform Security Reviews and Build Lasting Customer Confidence with a Trust Center

We looked at SafeBase Trust Centers from over 800 leading companies to identify foundational components every CISO should embed into their own infrastructure as well as blind spots to anticipate in this best practices guide.

Transform Security Reviews and Build Lasting Customer Confidence with a Trust Center

We looked at SafeBase Trust Centers from over 800 leading companies to identify foundational components every CISO should embed into their own infrastructure as well as blind spots to anticipate in this best practices guide.
SafeBase
What Issues and Challenges Cybersecurity Pros Care About

What Issues and Challenges Cybersecurity Pros Care About

Cybersecurity professionals are navigating a complex landscape of modern threats. This just-released Dark Reading report examines the perspectives of cybersecurity professionals regarding the bigget issues and challenges they are facing today. Findings indicate concerns about social engineering, AI, and the evolving threats are keeping them awake at night.

What Issues and Challenges Cybersecurity Pros Care About

Cybersecurity professionals are navigating a complex landscape of modern threats. This just-released Dark Reading report examines the perspectives of cybersecurity professionals regarding the bigget issues and challenges they are facing today. Findings indicate concerns about social engineering, AI, and the evolving threats are keeping them awake at night.
ThreatLocker
Taking the Uncertainty Out of Cyber Recovery for Nutanix AHV Environments

Taking the Uncertainty Out of Cyber Recovery for Nutanix AHV Environments

Available On-Demand

Taking the Uncertainty Out of Cyber Recovery for Nutanix AHV Environments

Available On-Demand
Rubrik
A CISO's Guide to Geopolitics and CyberSecurity

A CISO's Guide to Geopolitics and CyberSecurity

Geopolitical strain has escalated into cyberwarefare. CISOs need to know how to not only respond to such attacks, but prevent them.

A CISO's Guide to Geopolitics and CyberSecurity

Geopolitical strain has escalated into cyberwarefare. CISOs need to know how to not only respond to such attacks, but prevent them.
ExtraHop
Evolve Your Ransomware Defense

Evolve Your Ransomware Defense

Outsmart Ransomware: Discover How RevealX's Full Network Visibility Can Slash Detection Times and Boost Your ROI by 193%

Evolve Your Ransomware Defense

Outsmart Ransomware: Discover How RevealX's Full Network Visibility Can Slash Detection Times and Boost Your ROI by 193%
ExtraHop
RevealX Catches Ransomware Within Days of Deployment at Wood County Hospital

RevealX Catches Ransomware Within Days of Deployment at Wood County Hospital

The landscape of ransomware attacks is rapidly evolving. Learn how ExtraHop Reveal X was able to detect and thwart an attack for Wood County Hospital, just days after launch.

RevealX Catches Ransomware Within Days of Deployment at Wood County Hospital

The landscape of ransomware attacks is rapidly evolving. Learn how ExtraHop Reveal X was able to detect and thwart an attack for Wood County Hospital, just days after launch.
ExtraHop
The Anatomy of a Ransomware Attack

The Anatomy of a Ransomware Attack

Unpacking a Ransomware Attack, Minute by Minute. If you could detect every inflection point of a ransomware attack as it unfolded in real time, what would you do differently?

The Anatomy of a Ransomware Attack

Unpacking a Ransomware Attack, Minute by Minute. If you could detect every inflection point of a ransomware attack as it unfolded in real time, what would you do differently?
ExtraHop
The ROI of RevealX Against Ransomware

The ROI of RevealX Against Ransomware

With ransomware incidents increasing by 50% in 2023, you need crucial detection that existing security tools miss. See how RevealX addresses gaps in traditional security measures, providing faster threat detection and resolution.

The ROI of RevealX Against Ransomware

With ransomware incidents increasing by 50% in 2023, you need crucial detection that existing security tools miss. See how RevealX addresses gaps in traditional security measures, providing faster threat detection and resolution.
ExtraHop
Defense in Depth: Not Deep Enough

Defense in Depth: Not Deep Enough

Available On-Demand

Defense in Depth: Not Deep Enough

Available On-Demand
Rubrik
The Dirt on ROT Data

The Dirt on ROT Data

Available On-Demand

The Dirt on ROT Data

Available On-Demand
Rubrik
Delivering Business Value Through a Well-Governed Digital Identity Program

Delivering Business Value Through a Well-Governed Digital Identity Program

Discover how Identity and Access Management (IAM) drives business value with an attribute-based approach. This white paper outlines a framework for identity governance, offering best practices and guidance to enhance security, simplify access, ensure compliance and deliver measurable results.

Delivering Business Value Through a Well-Governed Digital Identity Program

Discover how Identity and Access Management (IAM) drives business value with an attribute-based approach. This white paper outlines a framework for identity governance, offering best practices and guidance to enhance security, simplify access, ensure compliance and deliver measurable results.
GuidePoint Security
Navigating IAM In A Cloud Based World: Strategies and Technologies for Success

Navigating IAM In A Cloud Based World: Strategies and Technologies for Success

Navigate evolving cybersecurity threats with practical insights on cloud security and IAM synergies to protect your digital assets.

Navigating IAM In A Cloud Based World: Strategies and Technologies for Success

Navigate evolving cybersecurity threats with practical insights on cloud security and IAM synergies to protect your digital assets.
GuidePoint Security
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.