Sponsored By

Test Resources with Theme2

Attention! We are excited to announce that we launched a new Testing Resources Page with Theme 2! This page is jam-packed with all the necessary resources to take your testing to the next level. Whether you're a seasoned pro or just starting, our comprehensive collection of resources will help you improve your testing skills and achieve better results. Don't miss out on this incredible opportunity to access our exclusive resources. Check out our Testing Resources Page with Theme2 today!

Showing results 1 - 30 of 1005
Showing results 1 - 30 of 1005

Filter by

Filters

From Reactive to Proactive: How Allowlisting Turns the Tables on Zero-Day Vulnerabilities

From Reactive to Proactive: How Allowlisting Turns the Tables on Zero-Day Vulnerabilities

This is an executive summary of the “From Reactive to Proactive: How Allowlisting Turns the Tables on Zero-Day Vulnerabilities” webinar that took place October 17th, 2024. The speaker was Rob Allen, Chief Product Officer (CPO), ThreatLocker. The webinar was moderated Jonathan Care, Advisor, Lionfish Tech Advisors (Moderator)

From Reactive to Proactive: How Allowlisting Turns the Tables on Zero-Day Vulnerabilities

This is an executive summary of the “From Reactive to Proactive: How Allowlisting Turns the Tables on Zero-Day Vulnerabilities” webinar that took place October 17th, 2024. The speaker was Rob Allen, Chief Product Officer (CPO), ThreatLocker. The webinar was moderated Jonathan Care, Advisor, Lionfish Tech Advisors (Moderator)
ThreatLocker
Securing Your Cloud Data Across the Attack Timeline

Securing Your Cloud Data Across the Attack Timeline

Wednesday, January 15, 2025 at 1 PM EST

Securing Your Cloud Data Across the Attack Timeline

Wednesday, January 15, 2025 at 1 PM EST
Rubrik
100 Critical Security Questions to Address in Your Trust Center

100 Critical Security Questions to Address in Your Trust Center

We analyzed data from hundreds of SafeBase Trust Centers across industries to uncover the top 100 core questions most frequently asked in security reviews.

100 Critical Security Questions to Address in Your Trust Center

We analyzed data from hundreds of SafeBase Trust Centers across industries to uncover the top 100 core questions most frequently asked in security reviews.
SafeBase
The Artificial Future Trend Micro Security Predictions for 2025

The Artificial Future Trend Micro Security Predictions for 2025

Thursday, January 16, 2025 at 1 PM EST

The Artificial Future Trend Micro Security Predictions for 2025

Thursday, January 16, 2025 at 1 PM EST
Trend Micro
Transform Security Reviews and Build Lasting Customer Confidence with a Trust Center

Transform Security Reviews and Build Lasting Customer Confidence with a Trust Center

We looked at SafeBase Trust Centers from over 800 leading companies to identify foundational components every CISO should embed into their own infrastructure as well as blind spots to anticipate in this best practices guide.

Transform Security Reviews and Build Lasting Customer Confidence with a Trust Center

We looked at SafeBase Trust Centers from over 800 leading companies to identify foundational components every CISO should embed into their own infrastructure as well as blind spots to anticipate in this best practices guide.
SafeBase
What Issues and Challenges Cybersecurity Pros Care About

What Issues and Challenges Cybersecurity Pros Care About

Cybersecurity professionals are navigating a complex landscape of modern threats. This just-released Dark Reading report examines the perspectives of cybersecurity professionals regarding the bigget issues and challenges they are facing today. Findings indicate concerns about social engineering, AI, and the evolving threats are keeping them awake at night.

What Issues and Challenges Cybersecurity Pros Care About

Cybersecurity professionals are navigating a complex landscape of modern threats. This just-released Dark Reading report examines the perspectives of cybersecurity professionals regarding the bigget issues and challenges they are facing today. Findings indicate concerns about social engineering, AI, and the evolving threats are keeping them awake at night.
ThreatLocker
Taking the Uncertainty Out of Cyber Recovery for Nutanix AHV Environments

Taking the Uncertainty Out of Cyber Recovery for Nutanix AHV Environments

Available On-Demand

Taking the Uncertainty Out of Cyber Recovery for Nutanix AHV Environments

Available On-Demand
Rubrik
A CISO's Guide to Geopolitics and CyberSecurity

A CISO's Guide to Geopolitics and CyberSecurity

Geopolitical strain has escalated into cyberwarefare. CISOs need to know how to not only respond to such attacks, but prevent them.

A CISO's Guide to Geopolitics and CyberSecurity

Geopolitical strain has escalated into cyberwarefare. CISOs need to know how to not only respond to such attacks, but prevent them.
ExtraHop
Evolve Your Ransomware Defense

Evolve Your Ransomware Defense

Outsmart Ransomware: Discover How RevealX's Full Network Visibility Can Slash Detection Times and Boost Your ROI by 193%

Evolve Your Ransomware Defense

Outsmart Ransomware: Discover How RevealX's Full Network Visibility Can Slash Detection Times and Boost Your ROI by 193%
ExtraHop
RevealX Catches Ransomware Within Days of Deployment at Wood County Hospital

RevealX Catches Ransomware Within Days of Deployment at Wood County Hospital

The landscape of ransomware attacks is rapidly evolving. Learn how ExtraHop Reveal X was able to detect and thwart an attack for Wood County Hospital, just days after launch.

RevealX Catches Ransomware Within Days of Deployment at Wood County Hospital

The landscape of ransomware attacks is rapidly evolving. Learn how ExtraHop Reveal X was able to detect and thwart an attack for Wood County Hospital, just days after launch.
ExtraHop
The Anatomy of a Ransomware Attack

The Anatomy of a Ransomware Attack

Unpacking a Ransomware Attack, Minute by Minute. If you could detect every inflection point of a ransomware attack as it unfolded in real time, what would you do differently?

The Anatomy of a Ransomware Attack

Unpacking a Ransomware Attack, Minute by Minute. If you could detect every inflection point of a ransomware attack as it unfolded in real time, what would you do differently?
ExtraHop
The ROI of RevealX Against Ransomware

The ROI of RevealX Against Ransomware

With ransomware incidents increasing by 50% in 2023, you need crucial detection that existing security tools miss. See how RevealX addresses gaps in traditional security measures, providing faster threat detection and resolution.

The ROI of RevealX Against Ransomware

With ransomware incidents increasing by 50% in 2023, you need crucial detection that existing security tools miss. See how RevealX addresses gaps in traditional security measures, providing faster threat detection and resolution.
ExtraHop
Defense in Depth: Not Deep Enough

Defense in Depth: Not Deep Enough

Thursday, December 19, 2024 at 1 PM EDT

Defense in Depth: Not Deep Enough

Thursday, December 19, 2024 at 1 PM EDT
Rubrik
The Dirt on ROT Data

The Dirt on ROT Data

Wednesday, December 18, 2024 at 1 PM EDT

The Dirt on ROT Data

Wednesday, December 18, 2024 at 1 PM EDT
Rubrik
Delivering Business Value Through a Well-Governed Digital Identity Program

Delivering Business Value Through a Well-Governed Digital Identity Program

Discover how Identity and Access Management (IAM) drives business value with an attribute-based approach. This white paper outlines a framework for identity governance, offering best practices and guidance to enhance security, simplify access, ensure compliance and deliver measurable results.

Delivering Business Value Through a Well-Governed Digital Identity Program

Discover how Identity and Access Management (IAM) drives business value with an attribute-based approach. This white paper outlines a framework for identity governance, offering best practices and guidance to enhance security, simplify access, ensure compliance and deliver measurable results.
GuidePoint Security
Navigating IAM In A Cloud Based World: Strategies and Technologies for Success

Navigating IAM In A Cloud Based World: Strategies and Technologies for Success

Navigate evolving cybersecurity threats with practical insights on cloud security and IAM synergies to protect your digital assets.

Navigating IAM In A Cloud Based World: Strategies and Technologies for Success

Navigate evolving cybersecurity threats with practical insights on cloud security and IAM synergies to protect your digital assets.
GuidePoint Security
Infographic: Emerging Best Practice for Proactive Security Solutions

Infographic: Emerging Best Practice for Proactive Security Solutions

Research shows that organizations are now investing in proactive security over preventative and reactive approaches, in the shift towards more pre-emptive attack surface exposure management.

Infographic: Emerging Best Practice for Proactive Security Solutions

Research shows that organizations are now investing in proactive security over preventative and reactive approaches, in the shift towards more pre-emptive attack surface exposure management.
Titania
Measuring Success: How to Build Cybersecurity Program Metrics from the Ground Up

Measuring Success: How to Build Cybersecurity Program Metrics from the Ground Up

In today's evolving cybersecurity landscape, effectively communicating metrics to both technical and non-technical audiences is crucial. As cyber threats become more sophisticated, cybersecurity has shifted from a "don’t let it interfere" mindset to a strategic priority, with CISOs under pressure to prove program effectiveness and optimize costs.

Measuring Success: How to Build Cybersecurity Program Metrics from the Ground Up

In today's evolving cybersecurity landscape, effectively communicating metrics to both technical and non-technical audiences is crucial. As cyber threats become more sophisticated, cybersecurity has shifted from a "don’t let it interfere" mindset to a strategic priority, with CISOs under pressure to prove program effectiveness and optimize costs.
Axonius
Research in Emerging Best Practice in the Use of Proactive Security Solutions

Research in Emerging Best Practice in the Use of Proactive Security Solutions

Research reveals over 70% of businesses have increased spending on proactive security, outpacing preventative and reactive measures.

Research in Emerging Best Practice in the Use of Proactive Security Solutions

Research reveals over 70% of businesses have increased spending on proactive security, outpacing preventative and reactive measures.
Titania
The State of Cyber Resilience: Why IT and security leaders are bolstering cyber resilience as complexity increases

The State of Cyber Resilience: Why IT and security leaders are bolstering cyber resilience as complexity increases

The IT and security industry is rapidly evolving due to digital transformation, changing work environments, and increasing cyber threats, creating more complexity for teams. To adapt, IT and security leaders are focusing on strengthening cyber resilience to protect against external threats and address internal challenges such as staffing and resource constraints.

The State of Cyber Resilience: Why IT and security leaders are bolstering cyber resilience as complexity increases

The IT and security industry is rapidly evolving due to digital transformation, changing work environments, and increasing cyber threats, creating more complexity for teams. To adapt, IT and security leaders are focusing on strengthening cyber resilience to protect against external threats and address internal challenges such as staffing and resource constraints.
Axonius
The Current State of AI Adoption in Cybersecurity, Including its Opportunities

The Current State of AI Adoption in Cybersecurity, Including its Opportunities

Available On-Demand

The Current State of AI Adoption in Cybersecurity, Including its Opportunities

Available On-Demand
Trend Micro
Full Content Inspection: The New Standard in Network Security and Why It's Necessary

Full Content Inspection: The New Standard in Network Security and Why It's Necessary

Full Content Inspection (FCI) is unlike any other security control. It is a new network security capability that opens, fully inspects, and edits live network traffic -- at the application layer -- to detect and prevent hacking attempts automatically, and better than any other technology ever invented. It sits in the middle of an internet connection to defeat hacking attempts more effectively than relying on static indicators of compromise (IOCs) or traditional signatures.

Full Content Inspection: The New Standard in Network Security and Why It's Necessary

Full Content Inspection (FCI) is unlike any other security control. It is a new network security capability that opens, fully inspects, and edits live network traffic -- at the application layer -- to detect and prevent hacking attempts automatically, and better than any other technology ever invented. It sits in the middle of an internet connection to defeat hacking attempts more effectively than relying on static indicators of compromise (IOCs) or traditional signatures.
Trinity Cyber
4 Steps to Deploying an AppSec Training Program

4 Steps to Deploying an AppSec Training Program

You can uplevel cybersecurity awareness and improve application security in four simple steps with this AppSec training program guide from CMD+CTRL Security.

4 Steps to Deploying an AppSec Training Program

You can uplevel cybersecurity awareness and improve application security in four simple steps with this AppSec training program guide from CMD+CTRL Security.
CMD+CTRL Security
Enhancing Cybersecurity: The Critical Role Of Software Security Training

Enhancing Cybersecurity: The Critical Role Of Software Security Training

Software vulnerabilities can have a critical impact on operations, from financial losses to delayed time-to-market. Our study found that 89% of developers receive significant security training while other stakeholders often lag behind. Learn more about the critical need for role-based training across all stages of the development lifecycle to reduce organizational risk.

Enhancing Cybersecurity: The Critical Role Of Software Security Training

Software vulnerabilities can have a critical impact on operations, from financial losses to delayed time-to-market. Our study found that 89% of developers receive significant security training while other stakeholders often lag behind. Learn more about the critical need for role-based training across all stages of the development lifecycle to reduce organizational risk.
CMD+CTRL Security
Identifying the Cybersecurity Metrics that Actually Matter

Identifying the Cybersecurity Metrics that Actually Matter

Available On-Demand

Identifying the Cybersecurity Metrics that Actually Matter

Available On-Demand
Axonius
Solution Brief: Introducing the runZero Platform

Solution Brief: Introducing the runZero Platform

runZero is the only CAASM (cyber asset attack surface management) solution that combines powerful proprietary active scanning, native passive discovery and API integrations. Unifying these discovery approaches makes our platform unique in its ability to discover and provide accurate, in-depth fingerprinting for all IT, OT, and IoT devices across on-prem, cloud, and remote environments, including identifying risky unmanaged assets, unknown networks, and outliers. Learn more in our solution brief

Solution Brief: Introducing the runZero Platform

runZero is the only CAASM (cyber asset attack surface management) solution that combines powerful proprietary active scanning, native passive discovery and API integrations. Unifying these discovery approaches makes our platform unique in its ability to discover and provide accurate, in-depth fingerprinting for all IT, OT, and IoT devices across on-prem, cloud, and remote environments, including identifying risky unmanaged assets, unknown networks, and outliers. Learn more in our solution brief
runZero
The State of Asset Security: Uncovering Alarming Gaps & Unexpected Exposures

The State of Asset Security: Uncovering Alarming Gaps & Unexpected Exposures

runZero's research team analyzed tens of millions of data points to understand attack surfaces, exposure patterns, and emerging threats. Our research reveals alarming gaps and unexpected trends, including the decay of network segmentation, persistent challenges in attack surface management, and an increasing volume of dark matter on modern networks. Get the full report to see what we found!

The State of Asset Security: Uncovering Alarming Gaps & Unexpected Exposures

runZero's research team analyzed tens of millions of data points to understand attack surfaces, exposure patterns, and emerging threats. Our research reveals alarming gaps and unexpected trends, including the decay of network segmentation, persistent challenges in attack surface management, and an increasing volume of dark matter on modern networks. Get the full report to see what we found!
runZero
EDR vs. XDR vs. MDR:The Cybersecurity ABCs Explained

EDR vs. XDR vs. MDR:The Cybersecurity ABCs Explained

When considering SIEM alternatives like EDR, XDR, or MDR, making the right choice can significantly impact your ability to optimize resources and reduce your organization’s exposure to threats. Understanding the differences between these solutions, along with how they compare to traditional SIEM tools, is crucial in selecting the best option for your organization’s unique needs.

EDR vs. XDR vs. MDR:The Cybersecurity ABCs Explained

When considering SIEM alternatives like EDR, XDR, or MDR, making the right choice can significantly impact your ability to optimize resources and reduce your organization’s exposure to threats. Understanding the differences between these solutions, along with how they compare to traditional SIEM tools, is crucial in selecting the best option for your organization’s unique needs.
Adlumin
The Executive's Guide to Cybersecurity

The Executive's Guide to Cybersecurity

This overview guide outlines the current cybersecurity threat landscape and how a security operations platform can help organizations better secure their network while also providing security and IT teams with additional resources. It aims to provide executives with a clear understanding of the platform’s business benefits.

The Executive's Guide to Cybersecurity

This overview guide outlines the current cybersecurity threat landscape and how a security operations platform can help organizations better secure their network while also providing security and IT teams with additional resources. It aims to provide executives with a clear understanding of the platform’s business benefits.
Adlumin
The Ultimate Guide to Using Cybersecurity AI

The Ultimate Guide to Using Cybersecurity AI

Explore the benefits of integrating AI into your strategy and learn how it revolutionizes your Security Operations Center (SOC) across crucial threat detection and response stages. This guide aims to provide valuable insights into responsible AI implementation with Adlumin’s recommendations for a strategic approach to cybersecurity.

The Ultimate Guide to Using Cybersecurity AI

Explore the benefits of integrating AI into your strategy and learn how it revolutionizes your Security Operations Center (SOC) across crucial threat detection and response stages. This guide aims to provide valuable insights into responsible AI implementation with Adlumin’s recommendations for a strategic approach to cybersecurity.
Adlumin
Daily news, dev blogs, and stories from Game Developer straight to your inbox