Sponsored By

Test Resources with Theme2

Attention! We are excited to announce that we launched a new Testing Resources Page with Theme 2! This page is jam-packed with all the necessary resources to take your testing to the next level. Whether you're a seasoned pro or just starting, our comprehensive collection of resources will help you improve your testing skills and achieve better results. Don't miss out on this incredible opportunity to access our exclusive resources. Check out our Testing Resources Page with Theme2 today!

Showing results 481 - 510 of 1003
Showing results 481 - 510 of 1003

Filter by

Filters

12 Tips to Implementing an Effective AppSec Program

12 Tips to Implementing an Effective AppSec Program

Most organizations have some form of AppSec program, but feel it’s not as effective as it needs to be. Get the top tips of implementing an effective AppSec program here.

12 Tips to Implementing an Effective AppSec Program

Most organizations have some form of AppSec program, but feel it’s not as effective as it needs to be. Get the top tips of implementing an effective AppSec program here.
Optiv
5 Questions for Your Pentesting Provider Infographic

5 Questions for Your Pentesting Provider Infographic

Are you asking the right questions when determining who should be conducting your penetration testing?

5 Questions for Your Pentesting Provider Infographic

Are you asking the right questions when determining who should be conducting your penetration testing?
Optiv
Building a Successful Application Security Program

Building a Successful Application Security Program

Learn how to effectively initiate an AppSec program by building frameworks and models, ensuring program governance, maintaining and crafting secure-by-design architecture.

Building a Successful Application Security Program

Learn how to effectively initiate an AppSec program by building frameworks and models, ensuring program governance, maintaining and crafting secure-by-design architecture.
Optiv
Get Inside a Hacker's Mind

Get Inside a Hacker's Mind

Attackers love unknown weaknesses in your software, hardware and end-use environments. In this infographic learn the steps you can take to actively defend your assets, ensure your current controls are working and cover your cybersecurity bases.

Get Inside a Hacker's Mind

Attackers love unknown weaknesses in your software, hardware and end-use environments. In this infographic learn the steps you can take to actively defend your assets, ensure your current controls are working and cover your cybersecurity bases.
Optiv
Implement a Continuous Threat Exposure Management (CTEM) Program

Implement a Continuous Threat Exposure Management (CTEM) Program

Enterprises fail at reducing their exposure to threats through self-assessment of risks because of unrealistic, siloed and tool-centric approaches. Security and risk management leaders must initiate and mature a CTEM program to stay ahead of threats.

Implement a Continuous Threat Exposure Management (CTEM) Program

Enterprises fail at reducing their exposure to threats through self-assessment of risks because of unrealistic, siloed and tool-centric approaches. Security and risk management leaders must initiate and mature a CTEM program to stay ahead of threats.
Optiv
Penetration Testing Belongs in Every Cybersecurity Strategy

Penetration Testing Belongs in Every Cybersecurity Strategy

Discover why modern pen testing is important, formidable security challenges and how Optiv’s pen testing services provide flexible delivery choices for any size environment.

Penetration Testing Belongs in Every Cybersecurity Strategy

Discover why modern pen testing is important, formidable security challenges and how Optiv’s pen testing services provide flexible delivery choices for any size environment.
Optiv
The State of Supply Chain Threats

The State of Supply Chain Threats

Widely exploited vulnerabilities in open source software and malicious components being loaded in trusted public repositories have highlighted issues in the software supply chain. Here’s what organizations are doing to mitigate their risk.

The State of Supply Chain Threats

Widely exploited vulnerabilities in open source software and malicious components being loaded in trusted public repositories have highlighted issues in the software supply chain. Here’s what organizations are doing to mitigate their risk.
Mend
Building Cyber Resiliency: Key Strategies for Proactive Security Operations

Building Cyber Resiliency: Key Strategies for Proactive Security Operations

Understand a new framework to continuously identify, prioritize, and address your most business-critical exposures.

Building Cyber Resiliency: Key Strategies for Proactive Security Operations

Understand a new framework to continuously identify, prioritize, and address your most business-critical exposures.
Mandiant
Global Perspectives on Threat Intelligence

Global Perspectives on Threat Intelligence

Learn how 1,350 decision-makers are navigating an evolving global threat landscape and how to protect your organization.

Global Perspectives on Threat Intelligence

Learn how 1,350 decision-makers are navigating an evolving global threat landscape and how to protect your organization.
Mandiant
Mandiant Threat Intelligence at Penn State Health

Mandiant Threat Intelligence at Penn State Health

See how Mandiant helps Penn State Health protect expanding infrastructure from malware and malicious cyber actors.

Mandiant Threat Intelligence at Penn State Health

See how Mandiant helps Penn State Health protect expanding infrastructure from malware and malicious cyber actors.
Mandiant
Preventing Attackers From Navigating Your Enterprise Systems

Preventing Attackers From Navigating Your Enterprise Systems

| Live Webinar | Wednesday, September 20, 2023 | 1pm ET |

Preventing Attackers From Navigating Your Enterprise Systems

| Live Webinar | Wednesday, September 20, 2023 | 1pm ET |
Delinea
The Evolution of the Vulnerability Landscape in 2023

The Evolution of the Vulnerability Landscape in 2023

| Live Webinar | Wednesday, September 27, 2023 | 1pm ET |

The Evolution of the Vulnerability Landscape in 2023

| Live Webinar | Wednesday, September 27, 2023 | 1pm ET |
Mandiant
The Forrester Wave�: External Threat Intelligence Service Providers, Q3 2023.

The Forrester Wave�: External Threat Intelligence Service Providers, Q3 2023.

Google was named a Leader in The Forrester Wave™: External Threat Intelligence Service Providers, Q3 2023. Forrester identified 12 top companies in the threat intelligence space and Google received the highest possible score in 15 out of the 29 criteria.

The Forrester Wave�: External Threat Intelligence Service Providers, Q3 2023.

Google was named a Leader in The Forrester Wave™: External Threat Intelligence Service Providers, Q3 2023. Forrester identified 12 top companies in the threat intelligence space and Google received the highest possible score in 15 out of the 29 criteria.
Mandiant
Threat Intelligence: Data, People and Processes

Threat Intelligence: Data, People and Processes

Learn how Mandiant Threat Intelligence can help protect organizations from stealthy, fast-moving adversaries.

Threat Intelligence: Data, People and Processes

Learn how Mandiant Threat Intelligence can help protect organizations from stealthy, fast-moving adversaries.
Mandiant
Tips for A Streamlined Transition to Zero Trust

Tips for A Streamlined Transition to Zero Trust

| On-Demand | Thursday, October 5, 2023 | 1pm ET |

Tips for A Streamlined Transition to Zero Trust

| On-Demand | Thursday, October 5, 2023 | 1pm ET |
SonicWall
Managing Security In a Hybrid Cloud Environment

Managing Security In a Hybrid Cloud Environment

| Live Webinar | Thursday, September 14, 2023 | 1pm ET |

Managing Security In a Hybrid Cloud Environment

| Live Webinar | Thursday, September 14, 2023 | 1pm ET |
Wiz
Passwords Are Pass�: Next Gen Authentication for Today's Threats

Passwords Are Pass�: Next Gen Authentication for Today's Threats

| Live Webinar | Thursday, September 21, 2023 | 1pm ET |

Passwords Are Pass�: Next Gen Authentication for Today's Threats

| Live Webinar | Thursday, September 21, 2023 | 1pm ET |
NordPass
9 Traits You Need to Succeed as a Cybersecurity Leader

9 Traits You Need to Succeed as a Cybersecurity Leader

Cybersecurity is an important factor for business prosperity. This whitepaper shares the 9 traits you need to succeed as a cybersecurity leader.

9 Traits You Need to Succeed as a Cybersecurity Leader

Cybersecurity is an important factor for business prosperity. This whitepaper shares the 9 traits you need to succeed as a cybersecurity leader.
(ISC)²
9 Traits You Need to Succeed as a Cybersecurity Leader

9 Traits You Need to Succeed as a Cybersecurity Leader

Cybersecurity is an important factor for business prosperity. This whitepaper shares the 9 traits you need to succeed as a cybersecurity leader.

9 Traits You Need to Succeed as a Cybersecurity Leader

Cybersecurity is an important factor for business prosperity. This whitepaper shares the 9 traits you need to succeed as a cybersecurity leader.
(ISC)²
9 Traits You Need to Succeed as a Cybersecurity Leader

9 Traits You Need to Succeed as a Cybersecurity Leader

Cybersecurity is an important factor for business prosperity. This whitepaper shares the 9 traits you need to succeed as a cybersecurity leader.

9 Traits You Need to Succeed as a Cybersecurity Leader

Cybersecurity is an important factor for business prosperity. This whitepaper shares the 9 traits you need to succeed as a cybersecurity leader.
(ISC)²
Improving Supply Chain Security Through Threat Intelligence Sharing

Improving Supply Chain Security Through Threat Intelligence Sharing

Extending intelligence sharing and collective defense to their supply chain partners is critical for organizations. Learn how to mitigate the risk of your partners becoming conduits for enterprise breaches.

Improving Supply Chain Security Through Threat Intelligence Sharing

Extending intelligence sharing and collective defense to their supply chain partners is critical for organizations. Learn how to mitigate the risk of your partners becoming conduits for enterprise breaches.
Cyware
The Ultimate Guide to the CISSP

The Ultimate Guide to the CISSP

Become a CISSP -- Certified Information Systems Security Professional

The Ultimate Guide to the CISSP

Become a CISSP -- Certified Information Systems Security Professional
(ISC)²
The Ultimate Guide to the CISSP

The Ultimate Guide to the CISSP

Become a CISSP -- Certified Information Systems Security Professional

The Ultimate Guide to the CISSP

Become a CISSP -- Certified Information Systems Security Professional
(ISC)²
The Ultimate Guide to the CISSP

The Ultimate Guide to the CISSP

Become a CISSP -- Certified Information Systems Security Professional

The Ultimate Guide to the CISSP

Become a CISSP -- Certified Information Systems Security Professional
(ISC)²
Where and When Automation Makes Sense For Enterprise Cybersecurity

Where and When Automation Makes Sense For Enterprise Cybersecurity

| Live Webinar | Tuesday, August 29, 2023 | 1pm ET |

Where and When Automation Makes Sense For Enterprise Cybersecurity

| Live Webinar | Tuesday, August 29, 2023 | 1pm ET |
Hyperproof
What Ransomware Groups Look for in Enterprise Victims

What Ransomware Groups Look for in Enterprise Victims

It is easy to fall into the trap of thinking your organization is too small, or too uninteresting, to be targeted by ransomware. But as attacks against educational institutions, fast-food franchises, shipping companies, retailers, and healthcare organizations have shown, ransomware gangs are casting a wide net for their victims. Learn how attackers identify who to target and things they look for in victim networks when putting together their attack campaigns.

What Ransomware Groups Look for in Enterprise Victims

It is easy to fall into the trap of thinking your organization is too small, or too uninteresting, to be targeted by ransomware. But as attacks against educational institutions, fast-food franchises, shipping companies, retailers, and healthcare organizations have shown, ransomware gangs are casting a wide net for their victims. Learn how attackers identify who to target and things they look for in victim networks when putting together their attack campaigns.
Mandiant
Where and When Automation Makes Sense for Enterprise Security

Where and When Automation Makes Sense for Enterprise Security

A shortage of skilled IT security professionals has made it tempting to try to automate everything, but not everything can be safely automated. Learn how emerging automation technologies work and how security teams can implement them in a way that is both secure and effective.

Where and When Automation Makes Sense for Enterprise Security

A shortage of skilled IT security professionals has made it tempting to try to automate everything, but not everything can be safely automated. Learn how emerging automation technologies work and how security teams can implement them in a way that is both secure and effective.
Hyperproof
451 Research: MixMode harnesses self-supervised AI to optimize threat detection and response

451 Research: MixMode harnesses self-supervised AI to optimize threat detection and response

Learn how MixMode is the first solution to harness a form of advanced Generative AI for threat detection to decrease MTTD, increase SOC productivity, reduce false positives, and detect novel never-before-seen attacks.

451 Research: MixMode harnesses self-supervised AI to optimize threat detection and response

Learn how MixMode is the first solution to harness a form of advanced Generative AI for threat detection to decrease MTTD, increase SOC productivity, reduce false positives, and detect novel never-before-seen attacks.
MixMode
Cloud Security VS. On-Prem: Why Traditional On-Prem Solutions Won't Work for Securing the Cloud

Cloud Security VS. On-Prem: Why Traditional On-Prem Solutions Won't Work for Securing the Cloud

Are you applying on-prem security solutions to the cloud? Learn why it's dangerous to apply on-prem cyber solutions to cloud environments and why it's leading to more breaches.

Cloud Security VS. On-Prem: Why Traditional On-Prem Solutions Won't Work for Securing the Cloud

Are you applying on-prem security solutions to the cloud? Learn why it's dangerous to apply on-prem cyber solutions to cloud environments and why it's leading to more breaches.
MixMode
The Inefficiencies of Legacy Tools: Why SIEMs Alone Are Ineffective at Detecting Advanced Attacks

The Inefficiencies of Legacy Tools: Why SIEMs Alone Are Ineffective at Detecting Advanced Attacks

The SIEM was never meant to be a solution for real-time threat detection. Learn why SIEM's are not equipped to detect advanced attacks and how your SOC can evolve beyond the SIEM for true realt-time threat detection.

The Inefficiencies of Legacy Tools: Why SIEMs Alone Are Ineffective at Detecting Advanced Attacks

The SIEM was never meant to be a solution for real-time threat detection. Learn why SIEM's are not equipped to detect advanced attacks and how your SOC can evolve beyond the SIEM for true realt-time threat detection.
MixMode
Daily news, dev blogs, and stories from Game Developer straight to your inbox