Sponsored By

Test Resources with Theme2

Attention! We are excited to announce that we launched a new Testing Resources Page with Theme 2! This page is jam-packed with all the necessary resources to take your testing to the next level. Whether you're a seasoned pro or just starting, our comprehensive collection of resources will help you improve your testing skills and achieve better results. Don't miss out on this incredible opportunity to access our exclusive resources. Check out our Testing Resources Page with Theme2 today!

Showing results 811 - 840 of 966
Showing results 811 - 840 of 966

Filter by

Filters

An Executive's Guide to Industrial Cybersecurity

An Executive's Guide to Industrial Cybersecurity

Download this guide to discover more about the importance of industrial cybersecurity.

An Executive's Guide to Industrial Cybersecurity

Download this guide to discover more about the importance of industrial cybersecurity.
Dragos
Analyzing Identity Risks (AIR) 2022

Analyzing Identity Risks (AIR) 2022

Illuminating identity risks that leave every organization vulnerable to attack

Analyzing Identity Risks (AIR) 2022

Illuminating identity risks that leave every organization vulnerable to attack
Illusive
Applying Zero Trust Principles to Devices

Applying Zero Trust Principles to Devices

Seven Best Practices to Protect Critical IT Resources from Vulnerable Devices

Applying Zero Trust Principles to Devices

Seven Best Practices to Protect Critical IT Resources from Vulnerable Devices
Infinipoint
AppSec Best Practices: Where Speed, Security, and Innovation Meet in the Middle

AppSec Best Practices: Where Speed, Security, and Innovation Meet in the Middle

In the race to innovation, security is getting left in the dust

AppSec Best Practices: Where Speed, Security, and Innovation Meet in the Middle

In the race to innovation, security is getting left in the dust
Invicti
AppSec Considerations For Modern Application Development(MAD)

AppSec Considerations For Modern Application Development(MAD)

A Comprehensive Guide for Leaders and Practitioners -- Part 3

AppSec Considerations For Modern Application Development(MAD)

A Comprehensive Guide for Leaders and Practitioners -- Part 3
Checkmarx
AppSec Shift Left Progress Report

AppSec Shift Left Progress Report

A Study on Enterprise Application Security

AppSec Shift Left Progress Report

A Study on Enterprise Application Security
Shiftleft
Architecting and Managing Hybrid and Cloudbased Identity Services

Architecting and Managing Hybrid and Cloudbased Identity Services

TechVision Research Reprint

Architecting and Managing Hybrid and Cloudbased Identity Services

TechVision Research Reprint
Radiant Logic
Augmenting Your Microsoft 365 EOP and MDO Email Security Infrastructure

Augmenting Your Microsoft 365 EOP and MDO Email Security Infrastructure

In today’s cloud-first approach to managing corporate infrastructure and running applications, more than 56% of global organizations use Microsoft for email.

Augmenting Your Microsoft 365 EOP and MDO Email Security Infrastructure

In today’s cloud-first approach to managing corporate infrastructure and running applications, more than 56% of global organizations use Microsoft for email.
Abnormal Security
Automated Pen Testing vs Breach and Attack Simulation

Automated Pen Testing vs Breach and Attack Simulation

Ask the Right Questions, Get the Best Answers

Automated Pen Testing vs Breach and Attack Simulation

Ask the Right Questions, Get the Best Answers
Cymulate
Behavioral Cybersecurity Statistics

Behavioral Cybersecurity Statistics

User successfully reported a phishing simulation sent by Hoxhunt by hitting the Hoxhunt reporting button plug-in.

Behavioral Cybersecurity Statistics

User successfully reported a phishing simulation sent by Hoxhunt by hitting the Hoxhunt reporting button plug-in.
HoxHunt
BotGuard for Applications Higher Education Case Study

BotGuard for Applications Higher Education Case Study

Security Team, Ping and HUMAN Collaborate to Protect Single-Sign-On at a Leading University

BotGuard for Applications Higher Education Case Study

Security Team, Ping and HUMAN Collaborate to Protect Single-Sign-On at a Leading University
HUMAN Security
BotGuard for Denial of Inventory & Stockouts

BotGuard for Denial of Inventory & Stockouts

Are Sophisticated Bots Cashing Out On Your Customer Experience?

BotGuard for Denial of Inventory & Stockouts

Are Sophisticated Bots Cashing Out On Your Customer Experience?
HUMAN Security
BotGuard for Streaming Service Case Study

BotGuard for Streaming Service Case Study

Let Product Teams Stay Focused on Delighting Customers

BotGuard for Streaming Service Case Study

Let Product Teams Stay Focused on Delighting Customers
HUMAN Security
BotGuard Supplements CDN and WAF Case Study

BotGuard Supplements CDN and WAF Case Study

CDN and WAF solutions protect against simple bot fraud, but is it enough?

BotGuard Supplements CDN and WAF Case Study

CDN and WAF solutions protect against simple bot fraud, but is it enough?
HUMAN Security
Bridging the Gap between DevOps and SecOps

Bridging the Gap between DevOps and SecOps

According to NTT AppSec Stats Flash Report, 85% of vulnerabilities that organizations find this year will never be remediated.

Bridging the Gap between DevOps and SecOps

According to NTT AppSec Stats Flash Report, 85% of vulnerabilities that organizations find this year will never be remediated.
WhiteHat Security
Build a Case for a Password Manager

Build a Case for a Password Manager

So you want to get a password manager for your company, but your boss--or their boss--is hesitant. Follow this guide to get the buy-in you need to implement Dashlane.

Build a Case for a Password Manager

So you want to get a password manager for your company, but your boss--or their boss--is hesitant. Follow this guide to get the buy-in you need to implement Dashlane.
Dashlane
Building and Maintaining Security at the Network Edge

Building and Maintaining Security at the Network Edge

Now on demand!

Building and Maintaining Security at the Network Edge

Now on demand!
Infoblox
Building Security Into the Application Development Lifecycle

Building Security Into the Application Development Lifecycle

Be able to better assess new development security tools for your organization's requirements!

Building Security Into the Application Development Lifecycle

Be able to better assess new development security tools for your organization's requirements!
Checkmarx
Business Buyers Guide to Password Managers

Business Buyers Guide to Password Managers

What you should look for in your solution and an overview of the top players

Business Buyers Guide to Password Managers

What you should look for in your solution and an overview of the top players
Dashlane
Buyer's Guide for Complete Privileged Access Management (PAM)

Buyer's Guide for Complete Privileged Access Management (PAM)

Improve accountability and control over privileged passwords

Buyer's Guide for Complete Privileged Access Management (PAM)

Improve accountability and control over privileged passwords
BeyondTrust
CISO Guide to Business Email Compromise

CISO Guide to Business Email Compromise

How to Stop the $2.4 Billion Problem

CISO Guide to Business Email Compromise

How to Stop the $2.4 Billion Problem
Abnormal Security
CleanINTERNET IoT Overview

CleanINTERNET IoT Overview

For Operational Technology, Industrial Control Systems, IoT & SCADA Environments

CleanINTERNET IoT Overview

For Operational Technology, Industrial Control Systems, IoT & SCADA Environments
Centripetal
Cloud security blind spots (and how to avoid them)

Cloud security blind spots (and how to avoid them)

Before choosing a cloud service offering, it is important to be aware of common security traps companies fall into.

Cloud security blind spots (and how to avoid them)

Before choosing a cloud service offering, it is important to be aware of common security traps companies fall into.
Vulcan Cyber
Comparison of Innovative Active Directory Protection Solutions

Comparison of Innovative Active Directory Protection Solutions

Active Directory is the central platform for managing identities and privileges in most enterprises, making it "ground zero" for the Zero Trust movement

Comparison of Innovative Active Directory Protection Solutions

Active Directory is the central platform for managing identities and privileges in most enterprises, making it "ground zero" for the Zero Trust movement
Attivo
Cortex XDR Scores 100% for Overall Action Prevention in AV-Comparatives

Cortex XDR Scores 100% for Overall Action Prevention in AV-Comparatives

In the 2022 Endpoint Prevention and Response Test by AV-Comparatives, Cortex® XDR™ was once again named a Strategic Leader.

Cortex XDR Scores 100% for Overall Action Prevention in AV-Comparatives

In the 2022 Endpoint Prevention and Response Test by AV-Comparatives, Cortex® XDR™ was once again named a Strategic Leader.
Palo Alto Networks
Cortex XDR: XDR for Dummies Guide

Cortex XDR: XDR for Dummies Guide

As a newer security solution category, many security pros have heard about extended detection and response (XDR), but they're not quite sure what it is.

Cortex XDR: XDR for Dummies Guide

As a newer security solution category, many security pros have heard about extended detection and response (XDR), but they're not quite sure what it is.
Palo Alto Networks
Cortex XSOAR - IDC Security Automation Maturity Model

Cortex XSOAR - IDC Security Automation Maturity Model

Over the years, SecOps teams have evolved as the issues they face evolve

Cortex XSOAR - IDC Security Automation Maturity Model

Over the years, SecOps teams have evolved as the issues they face evolve
Palo Alto Networks
Cyber Attack Simulations vs Pen Testing vs Vulnerability Scanning

Cyber Attack Simulations vs Pen Testing vs Vulnerability Scanning

How Targeted Cyberattack Simulations Differ from Penetration Tests & Vulnerability Scanning

Cyber Attack Simulations vs Pen Testing vs Vulnerability Scanning

How Targeted Cyberattack Simulations Differ from Penetration Tests & Vulnerability Scanning
Cymulate
CyberArk Privileged Access Management Solutions

CyberArk Privileged Access Management Solutions

The industry’s most complete solution to reduce risk created by privileged identities, credentials and secrets

CyberArk Privileged Access Management Solutions

The industry’s most complete solution to reduce risk created by privileged identities, credentials and secrets
Optiv
Cybersecurity Resilience Powered by a Leader in Managed Security Services

Cybersecurity Resilience Powered by a Leader in Managed Security Services

A Managed Security Service (MSS) solves this problem.

Cybersecurity Resilience Powered by a Leader in Managed Security Services

A Managed Security Service (MSS) solves this problem.
Trustwave
Daily news, dev blogs, and stories from Game Developer straight to your inbox