Cybersecurity Resource Library

The #1 source for free Cybersecurity reports, whitepapers, webinars, research and more.

Showing results 31 - 60 of 983
Showing results 31 - 60 of 983

Filter by

Filters

Beyond C and C++: Why Rust is the Future of Command and Control Framework Development

Beyond C and C++: Why Rust is the Future of Command and Control Framework Development

Unlocking the Power of Safety and Performance: Rust’s Role in Revolutionizing Command and Control Frameworks

Beyond C and C++: Why Rust is the Future of Command and Control Framework Development

Unlocking the Power of Safety and Performance: Rust’s Role in Revolutionizing Command and Control Frameworks
Ironwood Cyber
Cyber Drills Uncover Critical Vulnerabilities in First Responder Networks

Cyber Drills Uncover Critical Vulnerabilities in First Responder Networks

Prepare, Respond, Protect: Strengthening First Responder Networks with 'Cyber Drills'

Cyber Drills Uncover Critical Vulnerabilities in First Responder Networks

Prepare, Respond, Protect: Strengthening First Responder Networks with 'Cyber Drills'
Ironwood Cyber
Maximizing Cybersecurity on a Limited Budget: Strategic Defense in a Digital World

Maximizing Cybersecurity on a Limited Budget: Strategic Defense in a Digital World

Smart Security, Tight Budgets: Defend More with Less

Maximizing Cybersecurity on a Limited Budget: Strategic Defense in a Digital World

Smart Security, Tight Budgets: Defend More with Less
Ironwood Cyber
6 Best Practices for Developer Security in a Financial Services Institution

6 Best Practices for Developer Security in a Financial Services Institution

Developer security best practices for FinServ

6 Best Practices for Developer Security in a Financial Services Institution

Developer security best practices for FinServ
Snyk
Optimizing AppSec in the Financial Services Sector

Optimizing AppSec in the Financial Services Sector

A buyer’s guide for meeting the unprecedented speed and complexity of today’s development practices

Optimizing AppSec in the Financial Services Sector

A buyer’s guide for meeting the unprecedented speed and complexity of today’s development practices
Snyk
The State of Artificial Intelligence and Machine Learning in Cybersecurity

The State of Artificial Intelligence and Machine Learning in Cybersecurity

While AI appears to be coming of age, it’s still caught in awkward adolescence. Cybersecurity and IT departments are turning to AI to help them better manage and secure their businesses -- but not without some trepidation.

The State of Artificial Intelligence and Machine Learning in Cybersecurity

While AI appears to be coming of age, it’s still caught in awkward adolescence. Cybersecurity and IT departments are turning to AI to help them better manage and secure their businesses -- but not without some trepidation.
Google Cloud
Unleashing AI to Assess Cyber Security Risk

Unleashing AI to Assess Cyber Security Risk

Tuesday, November 12, 2024 at 1 PM EST

Unleashing AI to Assess Cyber Security Risk

Tuesday, November 12, 2024 at 1 PM EST
Darktrace
Don't Get Hacked Twice: The Critical Role of Clean Backups in Cyber Resilience

Don't Get Hacked Twice: The Critical Role of Clean Backups in Cyber Resilience

In an era where cyber threats loom large, having rapid and secure recovery options is essential for sustaining business continuity and adhering to compliance standards. This webinar explores the critical importance of clean backups and introduces the innovative Cleanroom Recovery approach. Learn how these methods enable organizations to manage cyber incidents with speed and confidence.

Don't Get Hacked Twice: The Critical Role of Clean Backups in Cyber Resilience

In an era where cyber threats loom large, having rapid and secure recovery options is essential for sustaining business continuity and adhering to compliance standards. This webinar explores the critical importance of clean backups and introduces the innovative Cleanroom Recovery approach. Learn how these methods enable organizations to manage cyber incidents with speed and confidence.
Commvault
The Right Way to Use Artificial Intelligence and Machine Learning in Incident Response

The Right Way to Use Artificial Intelligence and Machine Learning in Incident Response

Wednesday, November 20, 2024 at 1 PM EDT

The Right Way to Use Artificial Intelligence and Machine Learning in Incident Response

Wednesday, November 20, 2024 at 1 PM EDT
Mandant
Why is My CEO Texting Me? Tackling Executive Impersonation & Mobile Phishing Attacks

Why is My CEO Texting Me? Tackling Executive Impersonation & Mobile Phishing Attacks

Available On-Demand

Why is My CEO Texting Me? Tackling Executive Impersonation & Mobile Phishing Attacks

Available On-Demand
Lookout
Securing Tomorrow, Today: How to Navigate Zero Trust

Securing Tomorrow, Today: How to Navigate Zero Trust

Wednesday, November 13, 2024 at 1 PM EDT

Securing Tomorrow, Today: How to Navigate Zero Trust

Wednesday, November 13, 2024 at 1 PM EDT
Blue Mantis
Social Engineering: New Tricks, New Threats, New Defenses

Social Engineering: New Tricks, New Threats, New Defenses

Tuesday, October 22, 2024 at 11 AM EDT

Social Engineering: New Tricks, New Threats, New Defenses

Tuesday, October 22, 2024 at 11 AM EDT
Google Cloud Security
Insider Risk Programs: 3 Truths and a Lie

Insider Risk Programs: 3 Truths and a Lie

Join this webinar for insights on how to go beyond cyber controls and checklists that only show what occurred without indicating why for your insider risk program from Everfox, who brings 25+ years experience of securing governments & enterprise organization insider risk programs.

Insider Risk Programs: 3 Truths and a Lie

Join this webinar for insights on how to go beyond cyber controls and checklists that only show what occurred without indicating why for your insider risk program from Everfox, who brings 25+ years experience of securing governments & enterprise organization insider risk programs.
Everfox
Top 5 Things to Know About Cyber Resilience for Network Devices

Top 5 Things to Know About Cyber Resilience for Network Devices

In today's world, cyber resilience is no longer a choice - it's a necessity. Yet, despite growing awareness of its importance, network devices remain a significant vulnerability in many organizations' defenses.

Top 5 Things to Know About Cyber Resilience for Network Devices

In today's world, cyber resilience is no longer a choice - it's a necessity. Yet, despite growing awareness of its importance, network devices remain a significant vulnerability in many organizations' defenses.
BackBox Software
Transforming Network Configuration Management: Challenges and Solutions

Transforming Network Configuration Management: Challenges and Solutions

The traditional Network Configuration Management (NCM) model is no longer fit for purpose: With hybrid networks and increasing complexity on the rise, network teams need innovative solutions to stay ahead.

Transforming Network Configuration Management: Challenges and Solutions

The traditional Network Configuration Management (NCM) model is no longer fit for purpose: With hybrid networks and increasing complexity on the rise, network teams need innovative solutions to stay ahead.
BackBox Software
When Cyber Resilience Lags IT Exploits, Automation is the Answer

When Cyber Resilience Lags IT Exploits, Automation is the Answer

Rapidly evolving cyber threats demand a proactive approach: Cyber Resilience. By prioritizing this strategic imperative, organizations can effectively mitigate risk and ensure business continuity in the face of increasing digital complexity.

When Cyber Resilience Lags IT Exploits, Automation is the Answer

Rapidly evolving cyber threats demand a proactive approach: Cyber Resilience. By prioritizing this strategic imperative, organizations can effectively mitigate risk and ensure business continuity in the face of increasing digital complexity.
BackBox Software
Simplify Data Security with Automation

Simplify Data Security with Automation

Wednesday, October 30, 2024 at 1PM ET

Simplify Data Security with Automation

Wednesday, October 30, 2024 at 1PM ET
Rubrik
Anatomy of a Successful DevSecOps Program

Anatomy of a Successful DevSecOps Program

Wednesday, October 16, 2024 at 1 PM EDT

Anatomy of a Successful DevSecOps Program

Wednesday, October 16, 2024 at 1 PM EDT
Snyk
Cloud Data Protection Checklist for IT and Security Teams

Cloud Data Protection Checklist for IT and Security Teams

This Cloud Data Protection Checklist is a comprehensive list to help IT and security teams ensure they are implementing the best practices for safeguarding their valuable data. From encryption and access controls to data loss prevention and incident response, this checklist provides the necessary steps to ensure your data remains secure and protected from potential threats.

Cloud Data Protection Checklist for IT and Security Teams

This Cloud Data Protection Checklist is a comprehensive list to help IT and security teams ensure they are implementing the best practices for safeguarding their valuable data. From encryption and access controls to data loss prevention and incident response, this checklist provides the necessary steps to ensure your data remains secure and protected from potential threats.
Lookout
Data and Identity: The Evolving Security Paradigm

Data and Identity: The Evolving Security Paradigm

Data and identity have become the primary targets for cyberattacks, driven by the exponential growth in data volumes and the increasing complexity of identity management.

Data and Identity: The Evolving Security Paradigm

Data and identity have become the primary targets for cyberattacks, driven by the exponential growth in data volumes and the increasing complexity of identity management.
Cyera
Disaster Recovery Case Study

Disaster Recovery Case Study

Learn why this organization relies on Lookout's built-in data loss prevention (DLP) to safeguard their sensitive cloud data.

Disaster Recovery Case Study

Learn why this organization relies on Lookout's built-in data loss prevention (DLP) to safeguard their sensitive cloud data.
Lookout
How to Build an Effective Data Security Strategy

How to Build an Effective Data Security Strategy

Ensure all of your devices are secure. Learn the steps you need to take in order to build a comprehensive data security strategy.

How to Build an Effective Data Security Strategy

Ensure all of your devices are secure. Learn the steps you need to take in order to build a comprehensive data security strategy.
Lookout
SSE Buyer's Guide

SSE Buyer's Guide

SSE addresses modern enterprise challenges in cloud, remote work, and digital transformation. Here's how to select the best option for your organization.

SSE Buyer's Guide

SSE addresses modern enterprise challenges in cloud, remote work, and digital transformation. Here's how to select the best option for your organization.
Lookout
Top 3 Cloud Security Myths: Why Lookout makes protecting cloud data easy and cost-effective

Top 3 Cloud Security Myths: Why Lookout makes protecting cloud data easy and cost-effective

Reliable cloud security doesn’t need to be costly or complex. Learn how Lookout makes protecting cloud data easy and cost-effective.

Top 3 Cloud Security Myths: Why Lookout makes protecting cloud data easy and cost-effective

Reliable cloud security doesn’t need to be costly or complex. Learn how Lookout makes protecting cloud data easy and cost-effective.
Lookout
From Reactive to Proactive : How Allowlisting Turns the Tables on Zero-Day Vulnerabilities

From Reactive to Proactive : How Allowlisting Turns the Tables on Zero-Day Vulnerabilities

Thursday, October 17, 2024 at 1 PM EST

From Reactive to Proactive : How Allowlisting Turns the Tables on Zero-Day Vulnerabilities

Thursday, October 17, 2024 at 1 PM EST
ThreatLocker
10 Emerging Vulnerabilities Every Enterprise Should Know

10 Emerging Vulnerabilities Every Enterprise Should Know

Tuesday, October 29, 2024 at 1 PM EST

10 Emerging Vulnerabilities Every Enterprise Should Know

Tuesday, October 29, 2024 at 1 PM EST
Censys
2024 Cloud Security Report

2024 Cloud Security Report

Cloud security continues to be a critical concern as organizations increasingly leverage multi-cloud environments to drive business growth and innovation.

2024 Cloud Security Report

Cloud security continues to be a critical concern as organizations increasingly leverage multi-cloud environments to drive business growth and innovation.
Trend Micro (TM)
Building Blocks for Next-Generation Security Operations

Building Blocks for Next-Generation Security Operations

Tuesday, October 15, 2024 at 1PM EDT

Building Blocks for Next-Generation Security Operations

Tuesday, October 15, 2024 at 1PM EDT
Optiv
Product Review: Trend Vision One Cloud Security

Product Review: Trend Vision One Cloud Security

Amidst evolving cybersecurity challenges, including sophisticated cyber-attacks, cloud vulnerabilities, and the expansion of attack surfaces, there is an acute need for solutions that not only detect and respond to threats but also provide comprehensive visibility and risk management across diverse infrastructures.

Product Review: Trend Vision One Cloud Security

Amidst evolving cybersecurity challenges, including sophisticated cyber-attacks, cloud vulnerabilities, and the expansion of attack surfaces, there is an acute need for solutions that not only detect and respond to threats but also provide comprehensive visibility and risk management across diverse infrastructures.
Trend Micro (TM)
Get In Tune with Your Cloud Cyber Resilience Strategy

Get In Tune with Your Cloud Cyber Resilience Strategy

Tuesday, October 8, 2024 at 1PM ET

Get In Tune with Your Cloud Cyber Resilience Strategy

Tuesday, October 8, 2024 at 1PM ET
Rubrik
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.