Sponsored By

Test Resources with Theme2

Attention! We are excited to announce that we launched a new Testing Resources Page with Theme 2! This page is jam-packed with all the necessary resources to take your testing to the next level. Whether you're a seasoned pro or just starting, our comprehensive collection of resources will help you improve your testing skills and achieve better results. Don't miss out on this incredible opportunity to access our exclusive resources. Check out our Testing Resources Page with Theme2 today!

Showing results 511 - 540 of 1003
Showing results 511 - 540 of 1003

Filter by

Filters

The Threat Hunter's Playbook: Mastering Cloud Defense Strategies

The Threat Hunter's Playbook: Mastering Cloud Defense Strategies

| Live Webinar | Wednesday, September 13, 2023 | 1pm ET |

The Threat Hunter's Playbook: Mastering Cloud Defense Strategies

| Live Webinar | Wednesday, September 13, 2023 | 1pm ET |
Sysdig
Utilizing Artificial Intelligence Effectively in Cybersecurity

Utilizing Artificial Intelligence Effectively in Cybersecurity

"Comparing the Pros and Cons of Various AI Approaches in Cybersecurity"

Utilizing Artificial Intelligence Effectively in Cybersecurity

"Comparing the Pros and Cons of Various AI Approaches in Cybersecurity"
MixMode
2023 Cyber Insurance Looks Different. Are You Ready?

2023 Cyber Insurance Looks Different. Are You Ready?

Rampant ransomware attacks have made cyber insurance a C-suite priority. Despite the raised consciousness, it’s more difficult than ever to secure or renew a policy.

2023 Cyber Insurance Looks Different. Are You Ready?

Rampant ransomware attacks have made cyber insurance a C-suite priority. Despite the raised consciousness, it’s more difficult than ever to secure or renew a policy.
CyberArk
Addressing Security Compliance with Privileged Access Management

Addressing Security Compliance with Privileged Access Management

Complying with data privacy and security regulations can be a hurdle for many companies as they seek to thwart the growing number of cyber attacks. Implementing a privileged access management (PAM) solution can help improve your cybersecurity posture by satisfying security audit and compliance requirements.

Addressing Security Compliance with Privileged Access Management

Complying with data privacy and security regulations can be a hurdle for many companies as they seek to thwart the growing number of cyber attacks. Implementing a privileged access management (PAM) solution can help improve your cybersecurity posture by satisfying security audit and compliance requirements.
CyberArk
Buyer's Guide to Securing Privileged Access

Buyer's Guide to Securing Privileged Access

Identity Security is more critical than ever before in today’s modern business. But finding the right solution can be a monumental task.

Buyer's Guide to Securing Privileged Access

Identity Security is more critical than ever before in today’s modern business. But finding the right solution can be a monumental task.
CyberArk
CyberArk Named a Leader in the Gartner® Magic Quadrant™ for PAM -- Again

CyberArk Named a Leader in the Gartner® Magic Quadrant™ for PAM -- Again

CyberArk Named a Leader in the Gartner® Magic Quadrant™ for PAM -- again

CyberArk Named a Leader in the Gartner® Magic Quadrant™ for PAM -- Again

CyberArk Named a Leader in the Gartner® Magic Quadrant™ for PAM -- again
CyberArk
CyberArk Privileged Access Management Rapid Risk Reduction Jump Start Solution Brief

CyberArk Privileged Access Management Rapid Risk Reduction Jump Start Solution Brief

Has your organization experienced a major data breach? Do you need to quickly strengthen your security posture? Are you preparing for a big compliance audit? Are you getting ready to renew your cyber insurance coverage?

CyberArk Privileged Access Management Rapid Risk Reduction Jump Start Solution Brief

Has your organization experienced a major data breach? Do you need to quickly strengthen your security posture? Are you preparing for a big compliance audit? Are you getting ready to renew your cyber insurance coverage?
CyberArk
CyberArk Rapid Risk Reduction Checklist

CyberArk Rapid Risk Reduction Checklist

The Rapid Risk Reduction Checklist is a tool to help you quickly assess your organizations incident response readiness in the event of an advanced, stealthy attack.

CyberArk Rapid Risk Reduction Checklist

The Rapid Risk Reduction Checklist is a tool to help you quickly assess your organizations incident response readiness in the event of an advanced, stealthy attack.
CyberArk
How To Fast-Track Your PAM Deployment for Rapid Risk Reduction

How To Fast-Track Your PAM Deployment for Rapid Risk Reduction

Maybe your security team is facing an upcoming audit. Maybe you’ve failed one and need to address the audit findings. Or maybe you’re working to improve cyber readiness in the face of ransomware and other advanced attacks.

How To Fast-Track Your PAM Deployment for Rapid Risk Reduction

Maybe your security team is facing an upcoming audit. Maybe you’ve failed one and need to address the audit findings. Or maybe you’re working to improve cyber readiness in the face of ransomware and other advanced attacks.
CyberArk
SOAR is Dead Manifesto

SOAR is Dead Manifesto

80% of orgs agree: SOAR is too complex, costly, and time-consuming

SOAR is Dead Manifesto

80% of orgs agree: SOAR is too complex, costly, and time-consuming
Torq
The Secrets of Successful SecOps Data Analytics

The Secrets of Successful SecOps Data Analytics

If there’s something all security operations teams need, but few get right, it is utilizing security data analytics. An effective SecOps data analytics program enables SecOps teams to continuously monitor their environments for signs of compromise and stop potential attacks before they can cause serious damage. Also, good data makes effective collaboration between SecOps and IT possible. Here's how to make sense out of too much data and too many data sources for better enterprise security.

The Secrets of Successful SecOps Data Analytics

If there’s something all security operations teams need, but few get right, it is utilizing security data analytics. An effective SecOps data analytics program enables SecOps teams to continuously monitor their environments for signs of compromise and stop potential attacks before they can cause serious damage. Also, good data makes effective collaboration between SecOps and IT possible. Here's how to make sense out of too much data and too many data sources for better enterprise security.
Infoblox
Protecting the Database: How to Secure Your Enterprise Data

Protecting the Database: How to Secure Your Enterprise Data

| Live Webinar | Thursday, August 31, 2023 | 1pm ET |

Protecting the Database: How to Secure Your Enterprise Data

| Live Webinar | Thursday, August 31, 2023 | 1pm ET |
Cohesity
Adversaries That Evade Legacy Endpoint Solutions and What to Do About Them

Adversaries That Evade Legacy Endpoint Solutions and What to Do About Them

| Available On-Demand |

Adversaries That Evade Legacy Endpoint Solutions and What to Do About Them

| Available On-Demand |
CrowdStrike
Finding a Backup Strategy That Works For You

Finding a Backup Strategy That Works For You

| Available On-Demand |

Finding a Backup Strategy That Works For You

| Available On-Demand |
Cohesity
The Dark Side of AI: Unmasking its Threats and Navigating the Shadows of Cybersecurity in the Digital Age

The Dark Side of AI: Unmasking its Threats and Navigating the Shadows of Cybersecurity in the Digital Age

| On-Demand Webinar | Tuesday, August 22, 2023 | 1pm ET |

The Dark Side of AI: Unmasking its Threats and Navigating the Shadows of Cybersecurity in the Digital Age

| On-Demand Webinar | Tuesday, August 22, 2023 | 1pm ET |
KnowBe4
How Hackers Execute Mobile Attacks

How Hackers Execute Mobile Attacks

To secure the existing endpoints against modern attacks, organizations must understand the complex and unique risks that mobile devices bring. Download Zimperium's report explaining the anatomy of mobile attacks so that you can learn how to protect against them.

How Hackers Execute Mobile Attacks

To secure the existing endpoints against modern attacks, organizations must understand the complex and unique risks that mobile devices bring. Download Zimperium's report explaining the anatomy of mobile attacks so that you can learn how to protect against them.
Zimperium
Key Insights from Zimperium's 2023 Global Mobile Threat Report

Key Insights from Zimperium's 2023 Global Mobile Threat Report

Zimperium, the worldwide leader in mobile-first security, released their annual Global Mobile Threat Report that examines the trends that shaped the mobile security landscape over the last year and analyzes research from Zimperium’s zLabs team, as well as third-party industry data, partner insights, and observations from leading industry experts. Download the infographic with key insights from the report.

Key Insights from Zimperium's 2023 Global Mobile Threat Report

Zimperium, the worldwide leader in mobile-first security, released their annual Global Mobile Threat Report that examines the trends that shaped the mobile security landscape over the last year and analyzes research from Zimperium’s zLabs team, as well as third-party industry data, partner insights, and observations from leading industry experts. Download the infographic with key insights from the report.
Zimperium
Zimperium's 2023 Global Mobile Threat Report

Zimperium's 2023 Global Mobile Threat Report

Zimperium, the worldwide leader in mobile-first security, released their annual Global Mobile Threat Report that examines the trends that shaped the mobile security landscape over the last year and analyzes research from Zimperium’s zLabs team, as well as third-party industry data, partner insights, and observations from leading industry experts. Download the full report now.

Zimperium's 2023 Global Mobile Threat Report

Zimperium, the worldwide leader in mobile-first security, released their annual Global Mobile Threat Report that examines the trends that shaped the mobile security landscape over the last year and analyzes research from Zimperium’s zLabs team, as well as third-party industry data, partner insights, and observations from leading industry experts. Download the full report now.
Zimperium
Forrester Consulting: The Total Economic Impact� of Censys External Attack Surface Management

Forrester Consulting: The Total Economic Impact� of Censys External Attack Surface Management

In the Total Economic Impact™ of Censys External Attack Surface Management commissioned by Censys, Forrester Consulting conducted an independent study of Censys customers to evaluate the quantifiable business benefits that Censys EASM delivers.

Forrester Consulting: The Total Economic Impact� of Censys External Attack Surface Management

In the Total Economic Impact™ of Censys External Attack Surface Management commissioned by Censys, Forrester Consulting conducted an independent study of Censys customers to evaluate the quantifiable business benefits that Censys EASM delivers.
Censys
Inside the State of Data Security: The Hard Truths

Inside the State of Data Security: The Hard Truths

| Available On-Demand |

Inside the State of Data Security: The Hard Truths

| Available On-Demand |
Rubrik
The 2023 State of Security Leadership: Exploring the Struggles of CISOs in a Shifting Digital Terrain

The 2023 State of Security Leadership: Exploring the Struggles of CISOs in a Shifting Digital Terrain

Download the “The 2023 State of Security Leadership: Exploring the Struggles of CISOs in a Shifting Digital Terrain” report to learn the issues that are top of mind for security leaders, and what might put them at ease.

The 2023 State of Security Leadership: Exploring the Struggles of CISOs in a Shifting Digital Terrain

Download the “The 2023 State of Security Leadership: Exploring the Struggles of CISOs in a Shifting Digital Terrain” report to learn the issues that are top of mind for security leaders, and what might put them at ease.
Censys
Think Like An Attacker -- Your Guide to Cloud Security with Attack Surface Management

Think Like An Attacker -- Your Guide to Cloud Security with Attack Surface Management

How can security teams more effectively manage and protect their assets as their cloud presence grows? It requires thinking like an attacker

Think Like An Attacker -- Your Guide to Cloud Security with Attack Surface Management

How can security teams more effectively manage and protect their assets as their cloud presence grows? It requires thinking like an attacker
Censys
2023 CyberEdge Cyberthreat Defense Report

2023 CyberEdge Cyberthreat Defense Report

85% of organizations suffered from a successful cyberattack last year. This year, organizations are prioritizing bot management solutions to help get ahead of them. Read more about this and other priorities in the Cyberthreat Defense Report 2023, the most comprehensive view of IT security perceptions in our industry. Use the findings to benchmark your company’s security posture, operating budget, product investments, and best practices against peers in your industry.

2023 CyberEdge Cyberthreat Defense Report

85% of organizations suffered from a successful cyberattack last year. This year, organizations are prioritizing bot management solutions to help get ahead of them. Read more about this and other priorities in the Cyberthreat Defense Report 2023, the most comprehensive view of IT security perceptions in our industry. Use the findings to benchmark your company’s security posture, operating budget, product investments, and best practices against peers in your industry.
HUMAN Security
2023 Enterprise Bot Fraud Benchmark Report

2023 Enterprise Bot Fraud Benchmark Report

Bad bots like to hide in the shadows of the internet. It’s time to bring them to light. HUMAN’s annual Enterprise Bot Fraud Benchmark Report provides insights into automated attacks, including account takeover, brute forcing, carding, credential stuffing, inventory hoarding, scalping, and web scraping.

2023 Enterprise Bot Fraud Benchmark Report

Bad bots like to hide in the shadows of the internet. It’s time to bring them to light. HUMAN’s annual Enterprise Bot Fraud Benchmark Report provides insights into automated attacks, including account takeover, brute forcing, carding, credential stuffing, inventory hoarding, scalping, and web scraping.
HUMAN Security
Analyzing the Economic Benefits of HUMAN Security

Analyzing the Economic Benefits of HUMAN Security

TechTarget’s Enterprise Strategy Group (ESG) analyzed the impact of HUMAN Security in combating sophisticated bots, client-side threats, and account abuse, and reducing the costs and wasted IT resources associated with digital attacks.

Analyzing the Economic Benefits of HUMAN Security

TechTarget’s Enterprise Strategy Group (ESG) analyzed the impact of HUMAN Security in combating sophisticated bots, client-side threats, and account abuse, and reducing the costs and wasted IT resources associated with digital attacks.
HUMAN Security
Bot Management for Advanced Cybersecurity, Online Fraud Protection, Data and Service Integrity from Human

Bot Management for Advanced Cybersecurity, Online Fraud Protection, Data and Service Integrity from Human

In today’s digital world, businesses and organizations are continuously under threat from cybercriminals and bots.

Bot Management for Advanced Cybersecurity, Online Fraud Protection, Data and Service Integrity from Human

In today’s digital world, businesses and organizations are continuously under threat from cybercriminals and bots.
HUMAN Security
Why Account Security Doesn't Stop at Login

Why Account Security Doesn't Stop at Login

Online accounts hold significant value for online businesses and their users, making them a prime target for fraud and abuse.

Why Account Security Doesn't Stop at Login

Online accounts hold significant value for online businesses and their users, making them a prime target for fraud and abuse.
HUMAN Security
Best Practices and Tools for OT and IT Security

Best Practices and Tools for OT and IT Security

| Live Webinar | Wednesday, August 16, 2023 | 1pm ET |

Best Practices and Tools for OT and IT Security

| Live Webinar | Wednesday, August 16, 2023 | 1pm ET |
Xona Systems
Buyer's Guide for Complete Privileged Access Management

Buyer's Guide for Complete Privileged Access Management

Unlock insight into the evolution of privilege management and identity security, analyses of current threat landscape trends, and key criteria to use as you journey towards a complete PAM strategy

Buyer's Guide for Complete Privileged Access Management

Unlock insight into the evolution of privilege management and identity security, analyses of current threat landscape trends, and key criteria to use as you journey towards a complete PAM strategy
BeyondTrust
Creating an Effective Incident Response Plan

Creating an Effective Incident Response Plan

Security teams are realizing their organizations will experience a cyber incident and that they need an effective incident response plan -- one that takes into account their requirements and has been tested.

Creating an Effective Incident Response Plan

Security teams are realizing their organizations will experience a cyber incident and that they need an effective incident response plan -- one that takes into account their requirements and has been tested.
Google Cloud
Daily news, dev blogs, and stories from Game Developer straight to your inbox