Cybersecurity Resource Library

The #1 source for free Cybersecurity reports, whitepapers, webinars, research and more.

Showing results 151 - 180 of 889
Showing results 151 - 180 of 889

Filter by

Filters

Winter 2024 G2 Grid Report: Best Third Party & Supplier Risk Management Software

Winter 2024 G2 Grid Report: Best Third Party & Supplier Risk Management Software

Not all Third Party Risk Management Software solutions are created equal.

Winter 2024 G2 Grid Report: Best Third Party & Supplier Risk Management Software

Not all Third Party Risk Management Software solutions are created equal.
AuditBoard
Developer-First Security Tools Buyers Guide

Developer-First Security Tools Buyers Guide

Download Snyk’s new buyers guide on what to consider when buying developer first security tools.

Developer-First Security Tools Buyers Guide

Download Snyk’s new buyers guide on what to consider when buying developer first security tools.
Snyk
How Enterprise Are Responding to the Incident Response Challenge

How Enterprise Are Responding to the Incident Response Challenge

Many organizations bolstered their incident response capabilities last year to address a wide and growing range of security threats to their IT environments. The efforts drove an increase in the number of organizations that have an established security operations center, dedicated security staff, and full-fledged incident response teams. Many have established security operations centers and have a dedicated incident response team to address a continuing increase in reported security incidents.

How Enterprise Are Responding to the Incident Response Challenge

Many organizations bolstered their incident response capabilities last year to address a wide and growing range of security threats to their IT environments. The efforts drove an increase in the number of organizations that have an established security operations center, dedicated security staff, and full-fledged incident response teams. Many have established security operations centers and have a dedicated incident response team to address a continuing increase in reported security incidents.
Dark Reading
How Enterprises Assess Their Cyber-Risk

How Enterprises Assess Their Cyber-Risk

Organizations have deployed an array of controls for managing cyber-risks as they deal with a complex landscape of threats.  While cloud and remote workforce issues dominate the  agenda, these are just two of the ever-increasing number of  cyber-risks at modern enterprise organizations

How Enterprises Assess Their Cyber-Risk

Organizations have deployed an array of controls for managing cyber-risks as they deal with a complex landscape of threats.  While cloud and remote workforce issues dominate the  agenda, these are just two of the ever-increasing number of  cyber-risks at modern enterprise organizations
Orca
Industrial Networks in the Age of Digitalization

Industrial Networks in the Age of Digitalization

Now more than ever, increasingly connected operational technology (OT) networks face real cyber threats -- and a generation of new industrial control system (ICS)/OT security products and services aims to fill the security gaps.

Industrial Networks in the Age of Digitalization

Now more than ever, increasingly connected operational technology (OT) networks face real cyber threats -- and a generation of new industrial control system (ICS)/OT security products and services aims to fill the security gaps.
Dark Reading
Zero-Trust Adoption Driven by Data Protection, Cloud Access Control, and Regulatory Compliance Requirements

Zero-Trust Adoption Driven by Data Protection, Cloud Access Control, and Regulatory Compliance Requirements

Zero-trust initiatives are a key focus for many companies. Nearly 30% of organizations are already rolling out zero-trust initiatives to control access to their data and assets and more than 80% will have the capability within the next 18 months. Organizations are addressing cybersecurity challenges by enhancing identity and access management, privileged-access management, and data classification. They expect to see budgets for zero-trust initiatives grow modestly over the next 12 months.

Zero-Trust Adoption Driven by Data Protection, Cloud Access Control, and Regulatory Compliance Requirements

Zero-trust initiatives are a key focus for many companies. Nearly 30% of organizations are already rolling out zero-trust initiatives to control access to their data and assets and more than 80% will have the capability within the next 18 months. Organizations are addressing cybersecurity challenges by enhancing identity and access management, privileged-access management, and data classification. They expect to see budgets for zero-trust initiatives grow modestly over the next 12 months.
Dark Reading
Arctic Wolf Labs' 2024 Cybersecurity Predictions

Arctic Wolf Labs' 2024 Cybersecurity Predictions

As we look towards 2024, we know that threat actors will continue to refine their techniques. Use this report, and the predictions and recommendations within, to help secure your organization against these growing and evolving threats.

Arctic Wolf Labs' 2024 Cybersecurity Predictions

As we look towards 2024, we know that threat actors will continue to refine their techniques. Use this report, and the predictions and recommendations within, to help secure your organization against these growing and evolving threats.
Arctic Wolf
DevSecOps: The Smart Way to Shift Left

DevSecOps: The Smart Way to Shift Left

| Live Webinar | Wednesday, February 14, 2024 | 1pm ET |

DevSecOps: The Smart Way to Shift Left

| Live Webinar | Wednesday, February 14, 2024 | 1pm ET |
Palo Alto Networks
The Big Business Of Cybercrime: A Deep Dive Guide

The Big Business Of Cybercrime: A Deep Dive Guide

Cybercrime has become a big business -- an entire ecosystem of organizations run just like yours. This report seeks to enlighten your understanding of cybercrime, including the vast ramifications it entails for your business now and in the future.

The Big Business Of Cybercrime: A Deep Dive Guide

Cybercrime has become a big business -- an entire ecosystem of organizations run just like yours. This report seeks to enlighten your understanding of cybercrime, including the vast ramifications it entails for your business now and in the future.
Arctic Wolf
The Human - AI Partnership

The Human - AI Partnership

What does the future hold for AI? See our full report for our insights, predictions, and what 800+ industry leaders think will happen next and how emerging technology may empower the next generation of security operations.

The Human - AI Partnership

What does the future hold for AI? See our full report for our insights, predictions, and what 800+ industry leaders think will happen next and how emerging technology may empower the next generation of security operations.
Arctic Wolf
SecOps and DevSecOps in the Cloud

SecOps and DevSecOps in the Cloud

This is an executive summary of the "SecOps & DevSecOps in the Cloud" webinar that took place December 14th, 2023. The speakers were Dr. Jason Clark, independent security researcher, and Charles Goldberg, Sr. Director, Product Marketing at Palo Alto Networks. The webinar was moderated by Becky Bracken, editor at Dark Reading.

SecOps and DevSecOps in the Cloud

This is an executive summary of the "SecOps & DevSecOps in the Cloud" webinar that took place December 14th, 2023. The speakers were Dr. Jason Clark, independent security researcher, and Charles Goldberg, Sr. Director, Product Marketing at Palo Alto Networks. The webinar was moderated by Becky Bracken, editor at Dark Reading.
Palo Alto Networks
Tips for Managing Cloud Security in a Hybrid Environment

Tips for Managing Cloud Security in a Hybrid Environment

| Live Webinar | Thursday, February 1, 2024 | 1pm ET |

Tips for Managing Cloud Security in a Hybrid Environment

| Live Webinar | Thursday, February 1, 2024 | 1pm ET |
Wiz
The InfoSec Survival Guide

The InfoSec Survival Guide

Today, security and compliance leaders are struggling under the pressure of maintaining ongoing compliance in the face of regulatory expansion, changing requirements, technical transformation, explosions of scale (data, users, assets), and the battle for talent. In the face of these encroaching demands, InfoSec professionals are in dire need of a new approach to compliance.

The InfoSec Survival Guide

Today, security and compliance leaders are struggling under the pressure of maintaining ongoing compliance in the face of regulatory expansion, changing requirements, technical transformation, explosions of scale (data, users, assets), and the battle for talent. In the face of these encroaching demands, InfoSec professionals are in dire need of a new approach to compliance.
AuditBoard
Threat Intelligence: Eyes on the Enemy

Threat Intelligence: Eyes on the Enemy

Threat intelligence is the gold standard for 21st-century cybersecurity. However, today's IT teams are overwhelmed by phishing scams, social engineering hacks, failures in managing third-party risks, and more. New research from CyberRisk Alliance and sponsored by AuditBoard, Threat Intelligence: Eyes on the Enemy examines critical steps for all organizations to equip themselves to handle the next generation of threats.

Threat Intelligence: Eyes on the Enemy

Threat intelligence is the gold standard for 21st-century cybersecurity. However, today's IT teams are overwhelmed by phishing scams, social engineering hacks, failures in managing third-party risks, and more. New research from CyberRisk Alliance and sponsored by AuditBoard, Threat Intelligence: Eyes on the Enemy examines critical steps for all organizations to equip themselves to handle the next generation of threats.
AuditBoard
Your Complete Guide to the New SEC Cybersecurity Rules

Your Complete Guide to the New SEC Cybersecurity Rules

In an effort to address the rise in cyber breaches, the U.S. Securities and Exchange Commission has released new cybersecurity disclosure requirements for public companies. Get a comprehensive guide to help you navigate the new rules, including key dates, an overview of the requirements, and steps to prepare.

Your Complete Guide to the New SEC Cybersecurity Rules

In an effort to address the rise in cyber breaches, the U.S. Securities and Exchange Commission has released new cybersecurity disclosure requirements for public companies. Get a comprehensive guide to help you navigate the new rules, including key dates, an overview of the requirements, and steps to prepare.
AuditBoard
Cybersecurity Isn't Enough

Cybersecurity Isn't Enough

Cybersecurity Isn’t Enough - The Information Security Ecosystem Dies Without External Data Privacy

Cybersecurity Isn't Enough

Cybersecurity Isn’t Enough - The Information Security Ecosystem Dies Without External Data Privacy
Privacy Bee
Mitigating Exposed PII

Mitigating Exposed PII

Mitigating Exposed PII Dramatically Lowers Risk of Data Breach via Social Engineering

Mitigating Exposed PII

Mitigating Exposed PII Dramatically Lowers Risk of Data Breach via Social Engineering
Privacy Bee
Where Data Privacy And Cybersecurity Intersect

Where Data Privacy And Cybersecurity Intersect

Where Data Privacy and Cybersecurity Intersect (and Don’t)

Where Data Privacy And Cybersecurity Intersect

Where Data Privacy and Cybersecurity Intersect (and Don’t)
Privacy Bee
2023 Snyk AI-Generated Code Security Report

2023 Snyk AI-Generated Code Security Report

56.4% say insecure AI suggestions are common, however security behaviors are not keeping up with AI code adoption.

2023 Snyk AI-Generated Code Security Report

56.4% say insecure AI suggestions are common, however security behaviors are not keeping up with AI code adoption.
Snyk
Arctic Wolf Labs' 2024 Cybersecurity Predictions

Arctic Wolf Labs' 2024 Cybersecurity Predictions

As we look towards 2024, we know that threat actors will continue to refine their techniques. Use this report, and the predictions and recommendations within, to help secure your organization against these growing and evolving threats.

Arctic Wolf Labs' 2024 Cybersecurity Predictions

As we look towards 2024, we know that threat actors will continue to refine their techniques. Use this report, and the predictions and recommendations within, to help secure your organization against these growing and evolving threats.
Arctic Wolf
The Big Business Of Cybercrime: A Deep Dive Guide

The Big Business Of Cybercrime: A Deep Dive Guide

Cybercrime has become a big business -- an entire ecosystem of organizations run just like yours. This report seeks to enlighten your understanding of cybercrime, including the vast ramifications it entails for your business now and in the future.

The Big Business Of Cybercrime: A Deep Dive Guide

Cybercrime has become a big business -- an entire ecosystem of organizations run just like yours. This report seeks to enlighten your understanding of cybercrime, including the vast ramifications it entails for your business now and in the future.
Arctic Wolf
The Human - AI Partnership

The Human - AI Partnership

What does the future hold for AI? See our full report for our insights, predictions, and what 800+ industry leaders think will happen next and how emerging technology may empower the next generation of security operations.

The Human - AI Partnership

What does the future hold for AI? See our full report for our insights, predictions, and what 800+ industry leaders think will happen next and how emerging technology may empower the next generation of security operations.
Arctic Wolf
The Keys to Successfully Securing Cloud-Native Environments

The Keys to Successfully Securing Cloud-Native Environments

As the use of cloud computing rises, so does the complexity of these environments and the volume of attacks targeting cloud systems. As the ability to spin up infrastructure becomes more decentralized, a new generation of vulnerabilities and risks are created in misdelivery, misconfiguration, and publishing errors. This is the world enterprise security teams find themselves as they work to secure their cloud systems. Here is how to secure cloud-native systems and development pipelines.

The Keys to Successfully Securing Cloud-Native Environments

As the use of cloud computing rises, so does the complexity of these environments and the volume of attacks targeting cloud systems. As the ability to spin up infrastructure becomes more decentralized, a new generation of vulnerabilities and risks are created in misdelivery, misconfiguration, and publishing errors. This is the world enterprise security teams find themselves as they work to secure their cloud systems. Here is how to secure cloud-native systems and development pipelines.
Palo Alto Networks
Elevating Your Data Security Game: Strengthening Your Security Posture Against Cyber Threats

Elevating Your Data Security Game: Strengthening Your Security Posture Against Cyber Threats

Available On-Demand

Elevating Your Data Security Game: Strengthening Your Security Posture Against Cyber Threats

Available On-Demand
Rubrik
The State of Generative AI in the Enterprise

The State of Generative AI in the Enterprise

With the sudden increase in organizations embracing generative AI tools, cybersecurity professionals are employing multiple strategies to mitigate risks to privacy, security, and regulatory compliance issues.

The State of Generative AI in the Enterprise

With the sudden increase in organizations embracing generative AI tools, cybersecurity professionals are employing multiple strategies to mitigate risks to privacy, security, and regulatory compliance issues.
Blink Ops
Finding Issues that Matter in Open Source Dependencies and Fixing them Without Developer Friction

Finding Issues that Matter in Open Source Dependencies and Fixing them Without Developer Friction

Available On-Demand

Finding Issues that Matter in Open Source Dependencies and Fixing them Without Developer Friction

Available On-Demand
Semgrep
Gartner Critical Capabilities for Application Security Testing 2023

Gartner Critical Capabilities for Application Security Testing 2023

Arm Yourself with the 2023 Critical Capabilities for Application Security Testing

Gartner Critical Capabilities for Application Security Testing 2023

Arm Yourself with the 2023 Critical Capabilities for Application Security Testing
OpenText
Gartner Magic Quadrant for Application Security Testing 2023

Gartner Magic Quadrant for Application Security Testing 2023

Defend Your Applications: Insights from the 2023 Gartner Magic Quadrant for Application Security Testing

Gartner Magic Quadrant for Application Security Testing 2023

Defend Your Applications: Insights from the 2023 Gartner Magic Quadrant for Application Security Testing
OpenText
Increase Speed and Accuracy with AI Driven Static Analysis Auditing

Increase Speed and Accuracy with AI Driven Static Analysis Auditing

Leverage millions of past audit decisions to power AI assisted auditing

Increase Speed and Accuracy with AI Driven Static Analysis Auditing

Leverage millions of past audit decisions to power AI assisted auditing
OpenText
The Developers Guide to API Security

The Developers Guide to API Security

Learn how to defend against the ten most common and serious API security risks

The Developers Guide to API Security

Learn how to defend against the ten most common and serious API security risks
OpenText
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.