Sponsored By

Test Resources with Theme2

Attention! We are excited to announce that we launched a new Testing Resources Page with Theme 2! This page is jam-packed with all the necessary resources to take your testing to the next level. Whether you're a seasoned pro or just starting, our comprehensive collection of resources will help you improve your testing skills and achieve better results. Don't miss out on this incredible opportunity to access our exclusive resources. Check out our Testing Resources Page with Theme2 today!

Showing results 721 - 750 of 966
Showing results 721 - 750 of 966

Filter by

Filters

Making Cybersecurity Mesh a Reality

Making Cybersecurity Mesh a Reality

Keys to an effective cybersecurity platform

Making Cybersecurity Mesh a Reality

Keys to an effective cybersecurity platform
Fortinet
Security Challenges of Work-From-Anywhere

Security Challenges of Work-From-Anywhere

The hybrid work model is here to stay

Security Challenges of Work-From-Anywhere

The hybrid work model is here to stay
Fortinet
Security Considerations for Working with Cloud Services Providers

Security Considerations for Working with Cloud Services Providers

| Available On-Demand |

Security Considerations for Working with Cloud Services Providers

| Available On-Demand |
Palo Alto Networks
Struggling To Securely Keep Up With Digital Acceleration

Struggling To Securely Keep Up With Digital Acceleration

Cyber incidents are the top concern for companies worldwide in 2022

Struggling To Securely Keep Up With Digital Acceleration

Cyber incidents are the top concern for companies worldwide in 2022
Fortinet
How to Protect Your Legacy Software Applications

How to Protect Your Legacy Software Applications

| Available On-Demand |

How to Protect Your Legacy Software Applications

| Available On-Demand |
Invicti
Cloud Security Essentials

Cloud Security Essentials

| Available On-Demand |

Cloud Security Essentials

| Available On-Demand |
RedSeal
Seeing Your Attack Surface Through the Eyes of an Adversary

Seeing Your Attack Surface Through the Eyes of an Adversary

| Available On-Demand |

Seeing Your Attack Surface Through the Eyes of an Adversary

| Available On-Demand |
Palo Alto Networks
Developing and Testing an Effective Breach Response Plan

Developing and Testing an Effective Breach Response Plan

| Available On-Demand |

Developing and Testing an Effective Breach Response Plan

| Available On-Demand |
Palo Alto Networks
Cybersecurity: What You Don't Know Can Hurt You

Cybersecurity: What You Don't Know Can Hurt You

| Available On-Demand |

Cybersecurity: What You Don't Know Can Hurt You

| Available On-Demand |
Palo Alto Networks
Analyzing and Correlating Security Operations Data

Analyzing and Correlating Security Operations Data

| Available On-Demand |

Analyzing and Correlating Security Operations Data

| Available On-Demand |
Palo Alto Networks
Are You Still Using a Legacy AV Solution? Here's Why It's Past Time to Replace It

Are You Still Using a Legacy AV Solution? Here's Why It's Past Time to Replace It

Only 8% of IT Security Executives Feel Very Confident in Their Legacy AV Solutions

Are You Still Using a Legacy AV Solution? Here's Why It's Past Time to Replace It

Only 8% of IT Security Executives Feel Very Confident in Their Legacy AV Solutions
Blackberry
See How Cybersecurity Has Evolved Over the Last Year

See How Cybersecurity Has Evolved Over the Last Year

As recent events illustrate, threat actors are more numerous, persistent, and sophisticated than ever.

See How Cybersecurity Has Evolved Over the Last Year

As recent events illustrate, threat actors are more numerous, persistent, and sophisticated than ever.
Blackberry
20 Tips to Make the Most of Your Pen Test

20 Tips to Make the Most of Your Pen Test

Not All Pen Test are Created Equal.

20 Tips to Make the Most of Your Pen Test

Not All Pen Test are Created Equal.
BishopFox
5 Essential Steps to Better Control Management for Cybersecurity Programs

5 Essential Steps to Better Control Management for Cybersecurity Programs

Establish Your Control Library

5 Essential Steps to Better Control Management for Cybersecurity Programs

Establish Your Control Library
ProcessUnity
A Requirements-Driven Approach to Cyber Threat Intelligence

A Requirements-Driven Approach to Cyber Threat Intelligence

Structured and repeatable processes should underpin the creation and maintenance of intelligence requirements.

A Requirements-Driven Approach to Cyber Threat Intelligence

Structured and repeatable processes should underpin the creation and maintenance of intelligence requirements.
Mandiant
Achieve Balanced Security and Performance with Next-Generation Software-Defined WAN

Achieve Balanced Security and Performance with Next-Generation Software-Defined WAN

Wired and wireless networks are no exceptions.

Achieve Balanced Security and Performance with Next-Generation Software-Defined WAN

Wired and wireless networks are no exceptions.
Fortinet
Aligning Internal Cybersecurity Practices with External Third-Party Risk Management

Aligning Internal Cybersecurity Practices with External Third-Party Risk Management

Recent trends indicate that it’s no longer enough to only address cybersecurity internally.

Aligning Internal Cybersecurity Practices with External Third-Party Risk Management

Recent trends indicate that it’s no longer enough to only address cybersecurity internally.
ProcessUnity
APT42: Crooked Charms, Cons and Compromises

APT42: Crooked Charms, Cons and Compromises

Active since at least 2015, APT42 is characterized by highly targeted spear phishing and surveillance operations against individuals and organizations of strategic interest to Iran.

APT42: Crooked Charms, Cons and Compromises

Active since at least 2015, APT42 is characterized by highly targeted spear phishing and surveillance operations against individuals and organizations of strategic interest to Iran.
Mandiant
Best Practices for Ongoing Vendor Monitoring

Best Practices for Ongoing Vendor Monitoring

Tips for Continuously Monitoring Your Vendor Landscape

Best Practices for Ongoing Vendor Monitoring

Tips for Continuously Monitoring Your Vendor Landscape
ProcessUnity
Block Attack Opportunities with Attack Surface Management

Block Attack Opportunities with Attack Surface Management

Understanding attack surface management

Block Attack Opportunities with Attack Surface Management

Understanding attack surface management
Mandiant
Create A Sustainable Cybersecurity Program with Security Control Frameworks

Create A Sustainable Cybersecurity Program with Security Control Frameworks

Build a Control-Centered Universe for Next-Level Cybersecurity Program Management

Create A Sustainable Cybersecurity Program with Security Control Frameworks

Build a Control-Centered Universe for Next-Level Cybersecurity Program Management
ProcessUnity
Cyber Threats Targeting Elections

Cyber Threats Targeting Elections

Cyber threats to democracy are a growing global challenge for government agencies, elected officials and election campaigns.

Cyber Threats Targeting Elections

Cyber threats to democracy are a growing global challenge for government agencies, elected officials and election campaigns.
Mandiant
Determine your Cyber Security Risk with Repurposed Ransomware

Determine your Cyber Security Risk with Repurposed Ransomware

The Serious Threat of Ransomware

Determine your Cyber Security Risk with Repurposed Ransomware

The Serious Threat of Ransomware
Mandiant
Developer-First Security Tools Buyers Guide

Developer-First Security Tools Buyers Guide

As we talk to leaders within IT organizations, it’s clear that there is a need to push security earlier in the cloud environment design process.

Developer-First Security Tools Buyers Guide

As we talk to leaders within IT organizations, it’s clear that there is a need to push security earlier in the cloud environment design process.
Snyk
Developer-Focused Security from Code to Cloud and Back to Code

Developer-Focused Security from Code to Cloud and Back to Code

Discover the importance of application security and cloud security teams working together to deliver more secure cloud native applications in this white paper.

Developer-Focused Security from Code to Cloud and Back to Code

Discover the importance of application security and cloud security teams working together to deliver more secure cloud native applications in this white paper.
Snyk
Five Keys to a Secure Work-From-Anywhere Solution

Five Keys to a Secure Work-From-Anywhere Solution

As organizations adopt hybrid work, they need to extend security to employees no matter where they may be located.

Five Keys to a Secure Work-From-Anywhere Solution

As organizations adopt hybrid work, they need to extend security to employees no matter where they may be located.
Fortinet
Fortifying Cyber Defenses with MDR

Fortifying Cyber Defenses with MDR

A Definitive Guide to Critical Managed Detection and Response Capabilities

Fortifying Cyber Defenses with MDR

A Definitive Guide to Critical Managed Detection and Response Capabilities
Mandiant
Fortifying Your Applications: A Guide to Penetration Testing

Fortifying Your Applications: A Guide to Penetration Testing

According to recent research, web application attacks were the leading cause of data breaches for six out of the last eight years

Fortifying Your Applications: A Guide to Penetration Testing

According to recent research, web application attacks were the leading cause of data breaches for six out of the last eight years
BishopFox
Guide for How to Outpace Today's Cyberthreats

Guide for How to Outpace Today's Cyberthreats

Security-Driven Networking and the Validation of Zero Trust Edge Strategy

Guide for How to Outpace Today's Cyberthreats

Security-Driven Networking and the Validation of Zero Trust Edge Strategy
Fortinet
Honest Security

Honest Security

" Splendid-- Inform the compliance team we’ve reduced the risk of fire".

Honest Security

" Splendid-- Inform the compliance team we’ve reduced the risk of fire".
Kolide
Daily news, dev blogs, and stories from Game Developer straight to your inbox