Cybersecurity Resource Library

The #1 source for free Cybersecurity reports, whitepapers, webinars, research and more.

Showing results 1 - 30 of 157
Showing results 1 - 30 of 157

Filter by

Filters

Enhancing DNS Security: Implementing Encrypted DNS to Meet CISA Guidelines

Thursday, July 18, 2024 at 1:00pm EDT

Enhancing DNS Security: Implementing Encrypted DNS to Meet CISA Guidelines

Thursday, July 18, 2024 at 1:00pm EDT
Infoblox

Data Protection Essentials: Proactive PII Leak Prevention and Data Mapping for GDPR

Join the former CISO of UiPath, Okta, Splunk, and SoFi to learn proactive approaches for preventing PII leaks and automating data mapping for compliance. Remediating PII leaks in production is costly and disruptive, while GDPR compliance often relies on manual spreadsheets and surveys. This session covers controls to minimize PII leak risks and streamline data mapping for compliance, featuring a new AI-powered code scanner that stops PII leaks at the code level and automates the creation of RoPA

Data Protection Essentials: Proactive PII Leak Prevention and Data Mapping for GDPR

Join the former CISO of UiPath, Okta, Splunk, and SoFi to learn proactive approaches for preventing PII leaks and automating data mapping for compliance. Remediating PII leaks in production is costly and disruptive, while GDPR compliance often relies on manual spreadsheets and surveys. This session covers controls to minimize PII leak risks and streamline data mapping for compliance, featuring a new AI-powered code scanner that stops PII leaks at the code level and automates the creation of RoPA
HoundDog.ai

All the Ways the Internet is Surveilling You

Thursday, July 25, 2024 at 1 PM EST

All the Ways the Internet is Surveilling You

Thursday, July 25, 2024 at 1 PM EST
Knowbe4

Next Generation Supply Chain Security

Thursday, July 11, 2024 at 1 PM EDT | Brought to you by Snyk

Next Generation Supply Chain Security

Thursday, July 11, 2024 at 1 PM EDT | Brought to you by Snyk
Snyk

Mind the Cyber Resilience Gap

View On-Demand

Mind the Cyber Resilience Gap

View On-Demand
Commvault

Protecting the Crown Jewels: Source Code Security

Wednesday, July 17, 2024 at 1 PM EDT | Brought to you by Mend.io

Protecting the Crown Jewels: Source Code Security

Wednesday, July 17, 2024 at 1 PM EDT | Brought to you by Mend.io
Mend.io

Empowering Developers, Automating Security: The Future of AppSec

Thursday, June 27, 2024 at 1 PM EDT | Brought to you by Snyk

Empowering Developers, Automating Security: The Future of AppSec

Thursday, June 27, 2024 at 1 PM EDT | Brought to you by Snyk
Snyk

Cutting Through the AI Hype: Practical Strategies for Real-World Cybersecurity Success

Wednesday, July 17, 2024; at 1 PM EDT | Brought to you by Sophos

Cutting Through the AI Hype: Practical Strategies for Real-World Cybersecurity Success

Wednesday, July 17, 2024; at 1 PM EDT | Brought to you by Sophos
Sophos Inc.

Gigamon CISO Series: Analyst Research on Supercharging Observability and AIOps with Network Telemetry

Available On-Demand

Gigamon CISO Series: Analyst Research on Supercharging Observability and AIOps with Network Telemetry

Available On-Demand
Gigamon

How to Use Threat Intelligence to Mitigate Third Party Risk

Wednesday, July 10, 2024 at 1 PM EDT | Brought to you by Cyble

How to Use Threat Intelligence to Mitigate Third Party Risk

Wednesday, July 10, 2024 at 1 PM EDT | Brought to you by Cyble
Cyble

Become a Cloud Security Expert in Under 48 Hours: Learn how to find, prioritize, and remediate risks in the cloud without adding complexity

Monday, May 6, 2024 at 1pm ET

Become a Cloud Security Expert in Under 48 Hours: Learn how to find, prioritize, and remediate risks in the cloud without adding complexity

Monday, May 6, 2024 at 1pm ET
Tenable

Gaining Visibility of the Entire Ransomware Kill Chain

Tuesday, June 11, 2024; at 1 PM EDT | Brought to you by Searchlight Cyber

Gaining Visibility of the Entire Ransomware Kill Chain

Tuesday, June 11, 2024; at 1 PM EDT | Brought to you by Searchlight Cyber
Searchlight Cyber

Intruders in the Library: Exploring DLL Hijacking Using Cortex XDR Analytics

Thursday, June 13 2024 at 1 PM EDT | Brought to you by Palo Alto Networks

Intruders in the Library: Exploring DLL Hijacking Using Cortex XDR Analytics

Thursday, June 13 2024 at 1 PM EDT | Brought to you by Palo Alto Networks
Palo Alto Networks

Preventing Attackers From Wandering Through Your Enterprise Infrastructure

Tuesday, June 18, 2024; at 1 PM EDT | Brought to you by Google Cloud Security

Preventing Attackers From Wandering Through Your Enterprise Infrastructure

Tuesday, June 18, 2024; at 1 PM EDT | Brought to you by Google Cloud Security
Google Cloud Security

AI Fitness v. Readiness: Is Your Security Program Ready to Tackle Generative AI Tools?

Available On-Demand

AI Fitness v. Readiness: Is Your Security Program Ready to Tackle Generative AI Tools?

Available On-Demand
Snyk

Extending Access Management: Securing Access for all Identities, Devices, and Applications

Tuesday, June 4, 2024 at 1 PM EST

Extending Access Management: Securing Access for all Identities, Devices, and Applications

Tuesday, June 4, 2024 at 1 PM EST
1Password

DevSecOps in the Cloud

Wednesday, May 29 2024 at 1 PM EST

DevSecOps in the Cloud

Wednesday, May 29 2024 at 1 PM EST
Wiz

Network Visibility is the Foundation of Zero Trust

On Demand Webinar

Network Visibility is the Foundation of Zero Trust

On Demand Webinar
Gigamon

Threat Hunting's Evolution: From On-Premise to the Cloud

Wednesday, June 5, 2024; at 1 PM EDT | Brought to you by LogRhythm

Threat Hunting's Evolution: From On-Premise to the Cloud

Wednesday, June 5, 2024; at 1 PM EDT | Brought to you by LogRhythm
LogRhythm

Assessing Software Supply Chain Risk

Thursday, June 6, 2024 at 1 PM EDT | Brought to you by Apiiro

Assessing Software Supply Chain Risk

Thursday, June 6, 2024 at 1 PM EDT | Brought to you by Apiiro
Apiiro

Why Effective Asset Management is Critical to Enterprise Cybersecurity

Available On-Demand

Why Effective Asset Management is Critical to Enterprise Cybersecurity

Available On-Demand
Panaseer

Is AI Identifying Threats to Your Network?

Tuesday, May 14, 2024 at 1pm EDT |Brought to you by Dark Reading

Is AI Identifying Threats to Your Network?

Tuesday, May 14, 2024 at 1pm EDT |Brought to you by Dark Reading
OpenText

Finding Your Way on the Path to Zero Trust

Available On-Demand

Finding Your Way on the Path to Zero Trust

Available On-Demand
ExtraHop

Safeguarding Political Campaigns: Defending Against Mass Phishing Attacks

Thursday, May 16, 2024 at 1 PM EST

Safeguarding Political Campaigns: Defending Against Mass Phishing Attacks

Thursday, May 16, 2024 at 1 PM EST
Sophos

Where and Why Threat Intelligence Makes Sense for Your Enterprise Security Strategy

Wednesday, May 15, 2024 at 1 PM EDT | Brought to you by Dark Reading

Where and Why Threat Intelligence Makes Sense for Your Enterprise Security Strategy

Wednesday, May 15, 2024 at 1 PM EDT | Brought to you by Dark Reading
Infoblox

The fuel in the new AI race: Data

Tuesday, April 23 at 1:00pm EST | Brought to you by Rubrik

The fuel in the new AI race: Data

Tuesday, April 23 at 1:00pm EST | Brought to you by Rubrik
Rubrik

Key Findings from the State of AppSec Report 2024

Tuesday, May 7, 2024 2 at 1 PM EDT

Key Findings from the State of AppSec Report 2024

Tuesday, May 7, 2024 2 at 1 PM EDT
OpenText

Beyond Spam Filters and Firewalls: Preventing Business Email Compromises in the Modern Enterprise

Available On-Demand

Beyond Spam Filters and Firewalls: Preventing Business Email Compromises in the Modern Enterprise

Available On-Demand
Darktrace

Defending Against Today's Threat Landscape with MDR

Thursday, April 18, 2024 at 1 PM ET | Brought to you by Palo Alto Networks

Defending Against Today's Threat Landscape with MDR

Thursday, April 18, 2024 at 1 PM ET | Brought to you by Palo Alto Networks
Palo Alto Networks

The Modern Kill Chain: How Attacks Have Gone From Months to Minutes

On Demand Webinar | Brought to you by Lookout

The Modern Kill Chain: How Attacks Have Gone From Months to Minutes

On Demand Webinar | Brought to you by Lookout
Lookout
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.