Sponsored By

Test Resources with Theme2

Attention! We are excited to announce that we launched a new Testing Resources Page with Theme 2! This page is jam-packed with all the necessary resources to take your testing to the next level. Whether you're a seasoned pro or just starting, our comprehensive collection of resources will help you improve your testing skills and achieve better results. Don't miss out on this incredible opportunity to access our exclusive resources. Check out our Testing Resources Page with Theme2 today!

Showing results 31 - 60 of 999
Showing results 31 - 60 of 999

Filter by

Filters

Cybersecurity Day: How to Automate Security Analytics with AI and ML

Cybersecurity Day: How to Automate Security Analytics with AI and ML

Tuesday, December 17, 2024 at 1 PM EST

Cybersecurity Day: How to Automate Security Analytics with AI and ML

Tuesday, December 17, 2024 at 1 PM EST
Snowflake
Enterprise Key Management Buyer's Guide

Enterprise Key Management Buyer's Guide

Despite what the industry thinks, only a few SSH key management solutions are able to handle modern, distributed digital environments.

Enterprise Key Management Buyer's Guide

Despite what the industry thinks, only a few SSH key management solutions are able to handle modern, distributed digital environments.
SSH
The Future of Cybersecurity is Passwordless and Keyless

The Future of Cybersecurity is Passwordless and Keyless

Passwordless and keyless authentication removes two fundamental sources of risk while making privileged access more streamlined, user-friendly, and cost-effective.

The Future of Cybersecurity is Passwordless and Keyless

Passwordless and keyless authentication removes two fundamental sources of risk while making privileged access more streamlined, user-friendly, and cost-effective.
SSH
Cyber-Physical Solutions for Safer & Smarter Business Growth

Cyber-Physical Solutions for Safer & Smarter Business Growth

Protect your business from cyber and physical threats with integrated security solutions for comprehensive threat management.

Cyber-Physical Solutions for Safer & Smarter Business Growth

Protect your business from cyber and physical threats with integrated security solutions for comprehensive threat management.
Claro Enterprise Solutions
Everything You Can Do to Fight Social Engineering and Phishing

Everything You Can Do to Fight Social Engineering and Phishing

Tuesday, December 3, 2024 at 1PM EST

Everything You Can Do to Fight Social Engineering and Phishing

Tuesday, December 3, 2024 at 1PM EST
Knowbe4
8 Essential Steps to Securing Your NIST AI RMF Implementation

8 Essential Steps to Securing Your NIST AI RMF Implementation

Secure your AI systems with NIST Risk Management Framework essentials for transparency, fairness, and accountability.

8 Essential Steps to Securing Your NIST AI RMF Implementation

Secure your AI systems with NIST Risk Management Framework essentials for transparency, fairness, and accountability.
Scrut Automation
A Practical Guide for Early-Stage CTOs Navigating Cybersecurity

A Practical Guide for Early-Stage CTOs Navigating Cybersecurity

Get strategic insights to strengthen compliance, choose the right vendors, and build a strong cybersecurity foundation.

A Practical Guide for Early-Stage CTOs Navigating Cybersecurity

Get strategic insights to strengthen compliance, choose the right vendors, and build a strong cybersecurity foundation.
Scrut Automation
Building Blocks for Next-Generation Security Operations

Building Blocks for Next-Generation Security Operations

This is an executive summary of the “Building Blocks for Next-Generation Security Operations” webinar that took place October 15th, 2024. The speakers wereJake Williams, VP of R&D, Hunter Strategy, and John Pelton, Sr. Director, Cyber Operations, Optiv. The webinar was moderated by Becky Bracken, editor at Dark Reading.

Building Blocks for Next-Generation Security Operations

This is an executive summary of the “Building Blocks for Next-Generation Security Operations” webinar that took place October 15th, 2024. The speakers wereJake Williams, VP of R&D, Hunter Strategy, and John Pelton, Sr. Director, Cyber Operations, Optiv. The webinar was moderated by Becky Bracken, editor at Dark Reading.
Optiv
Elevate Your Cyber Defense: Real-World Strategies

Elevate Your Cyber Defense: Real-World Strategies

Available On-Demand

Elevate Your Cyber Defense: Real-World Strategies

Available On-Demand
Hitachi Vantara
Splitmetrics Case Study: Market expansion with a security-first approach

Splitmetrics Case Study: Market expansion with a security-first approach

Use this guide to understand and comply with the EU AI Act, leveraging practical tips for securing AI systems.

Splitmetrics Case Study: Market expansion with a security-first approach

Use this guide to understand and comply with the EU AI Act, leveraging practical tips for securing AI systems.
Scrut Automation
The Great AI Regulation Road Trip through ISO 42001, NIST AI, and Beyond

The Great AI Regulation Road Trip through ISO 42001, NIST AI, and Beyond

AI systems that are resilient, compliant, and secure are the need of the hour. Download for more strategic insights.

The Great AI Regulation Road Trip through ISO 42001, NIST AI, and Beyond

AI systems that are resilient, compliant, and secure are the need of the hour. Download for more strategic insights.
Scrut Automation
The Seven Focus Areas Critical to Navigating the EU AI Act

The Seven Focus Areas Critical to Navigating the EU AI Act

Use this guide to understand and comply with the EU AI Act, leveraging practical tips for securing AI systems.

The Seven Focus Areas Critical to Navigating the EU AI Act

Use this guide to understand and comply with the EU AI Act, leveraging practical tips for securing AI systems.
Scrut Automation
Building Blocks for Next-Gen Security Operations

Building Blocks for Next-Gen Security Operations

Security operations are changing quickly. Security tools are evolving and AI is changing how organizations approach security analytics. Faced with an ever-expanding attack surface, increased threats, ever-tightening budgets, and more complex business technology environments, the modern SOC needs to blend human expertise with machine intelligence to be able to respond. Here's what CISOs and SOC managers need to know

Building Blocks for Next-Gen Security Operations

Security operations are changing quickly. Security tools are evolving and AI is changing how organizations approach security analytics. Faced with an ever-expanding attack surface, increased threats, ever-tightening budgets, and more complex business technology environments, the modern SOC needs to blend human expertise with machine intelligence to be able to respond. Here's what CISOs and SOC managers need to know
Optiv
Quantum next: Navigating a new cyber threat  landscape

Quantum next: Navigating a new cyber threat landscape

Assessing, preparing and proving technological and regulatory readiness to handle cyber attacks can be critical in a postquantum computing world.

Quantum next: Navigating a new cyber threat landscape

Assessing, preparing and proving technological and regulatory readiness to handle cyber attacks can be critical in a postquantum computing world.
PwC
Software Supply Chain State of the Union 2024

Software Supply Chain State of the Union 2024

From Innovation to Infiltration: Safeguarding Against the Hidden Dangers in Your Software Ecosystem

Software Supply Chain State of the Union 2024

From Innovation to Infiltration: Safeguarding Against the Hidden Dangers in Your Software Ecosystem
JFrog
Combat Session Hijacking and Credential Theft with Huntress MDR for Microsoft 365

Combat Session Hijacking and Credential Theft with Huntress MDR for Microsoft 365

Available On-Demand

Combat Session Hijacking and Credential Theft with Huntress MDR for Microsoft 365

Available On-Demand
Huntress
The State of Vulnerability Management in the Enterprise

The State of Vulnerability Management in the Enterprise

This just-released Dark Reading report examines vulnerability management practices and uncovers how organizations prioritize security flaws in their environments and what risk-based approaches they are taking to address them.

The State of Vulnerability Management in the Enterprise

This just-released Dark Reading report examines vulnerability management practices and uncovers how organizations prioritize security flaws in their environments and what risk-based approaches they are taking to address them.
Adaptiva
Comprehensive Guide To Security Operations

Comprehensive Guide To Security Operations

A comprehensive guide to minimize risk and continuously improve your security posture.

Comprehensive Guide To Security Operations

A comprehensive guide to minimize risk and continuously improve your security posture.
Arctic Wolf
NIS2: Why European Boards Need to Raise Their Cyber-risk Game

NIS2: Why European Boards Need to Raise Their Cyber-risk Game

The Network and Information Systems 2 (NIS2) directive is a Directive of the European Union to improve the security and resilience of networks and information systems and achieve a high common level of cybersecurity across the member countries in the EU. Companies will be required to disclose network and computer system incidents beyond just data breaches, as critical infrastructure and limited other industries were required under the initial directive.

NIS2: Why European Boards Need to Raise Their Cyber-risk Game

The Network and Information Systems 2 (NIS2) directive is a Directive of the European Union to improve the security and resilience of networks and information systems and achieve a high common level of cybersecurity across the member countries in the EU. Companies will be required to disclose network and computer system incidents beyond just data breaches, as critical infrastructure and limited other industries were required under the initial directive.
Arctic Wolf
Threat Report 2024

Threat Report 2024

This edition of the Arctic Wolf® Labs Threat Report draws upon the first-hand experience of Arctic Wolf’s security experts, augmented by research into the cybercrime ecosystem and additional credited data sources.

Threat Report 2024

This edition of the Arctic Wolf® Labs Threat Report draws upon the first-hand experience of Arctic Wolf’s security experts, augmented by research into the cybercrime ecosystem and additional credited data sources.
Arctic Wolf
IDC MarketScape: Worldwide SIEM for Enterprise 2024 Vendor Assessment

IDC MarketScape: Worldwide SIEM for Enterprise 2024 Vendor Assessment

Google is named a Visionary in the 2024 Gartner® Magic Quadrant™ for Security Information and Event Management (SIEM)

IDC MarketScape: Worldwide SIEM for Enterprise 2024 Vendor Assessment

Google is named a Visionary in the 2024 Gartner® Magic Quadrant™ for Security Information and Event Management (SIEM)
Google Cloud
The Defender's Advantage for Critical Infrastructure and Operational Technology

The Defender's Advantage for Critical Infrastructure and Operational Technology

In the face of escalating cyber threats targeting critical infrastructure and operational technology (OT), this comprehensive guide equips cybersecurity professionals with the knowledge and strategies needed to defend these vital systems.

The Defender's Advantage for Critical Infrastructure and Operational Technology

In the face of escalating cyber threats targeting critical infrastructure and operational technology (OT), this comprehensive guide equips cybersecurity professionals with the knowledge and strategies needed to defend these vital systems.
Google Cloud
The Defender's Advantage Solutions Guide

The Defender's Advantage Solutions Guide

The Defender’s Advantage guide, developed by Mandiant, part of Google Cloud, shares a proactive and intelligence-driven approach to cybersecurity.

The Defender's Advantage Solutions Guide

The Defender’s Advantage guide, developed by Mandiant, part of Google Cloud, shares a proactive and intelligence-driven approach to cybersecurity.
Google Cloud
The Defender's Advantage | A guide to activating cyber defense

The Defender's Advantage | A guide to activating cyber defense

When organizations are faced with adversaries in their own environment, they have a fundamental "defender's advantage."

The Defender's Advantage | A guide to activating cyber defense

When organizations are faced with adversaries in their own environment, they have a fundamental "defender's advantage."
Google Cloud
The Defender's Advantage: Using Artificial Intelligence in Cyber Defense

The Defender's Advantage: Using Artificial Intelligence in Cyber Defense

Organizations today sit in different places on the generative artificial intelligence (AI) adoption spectrum, but regardless of where they land, cyber defense teams can benefit from the use of AI solutions to identify threats, manage toil, and scale talent.

The Defender's Advantage: Using Artificial Intelligence in Cyber Defense

Organizations today sit in different places on the generative artificial intelligence (AI) adoption spectrum, but regardless of where they land, cyber defense teams can benefit from the use of AI solutions to identify threats, manage toil, and scale talent.
Google Cloud
What Network Resilience Means to Enterprise Cybersecurity Posture

What Network Resilience Means to Enterprise Cybersecurity Posture

Monday, November 18, 2024 at 1 PM EST

What Network Resilience Means to Enterprise Cybersecurity Posture

Monday, November 18, 2024 at 1 PM EST
Opentext
Work Smarter, Not Harder with Gemini in Security Operations

Work Smarter, Not Harder with Gemini in Security Operations

Transform your cybersecurity with frontline threat intelligence and expertise, intel-driven security operations, and a secure cloud platform -- all supercharged with AI.

Work Smarter, Not Harder with Gemini in Security Operations

Transform your cybersecurity with frontline threat intelligence and expertise, intel-driven security operations, and a secure cloud platform -- all supercharged with AI.
Google Cloud
6 Key Requirements of Multicloud Security

6 Key Requirements of Multicloud Security

Effective strategies to protect sensitive data and prevent breaches.

6 Key Requirements of Multicloud Security

Effective strategies to protect sensitive data and prevent breaches.
Palo Alto Networks
Frost Radar: Cloud Security Posture Management, 2024

Frost Radar: Cloud Security Posture Management, 2024

Learn why Prisma®️ Cloud was the top-rated innovation leader.

Frost Radar: Cloud Security Posture Management, 2024

Learn why Prisma®️ Cloud was the top-rated innovation leader.
Palo Alto Networks
The Definitive Guide to Container Security

The Definitive Guide to Container Security

The ultimate guide to securing your containers.

The Definitive Guide to Container Security

The ultimate guide to securing your containers.
Palo Alto Networks
Daily news, dev blogs, and stories from Game Developer straight to your inbox