Sponsored By

Test Resources with Theme2

Attention! We are excited to announce that we launched a new Testing Resources Page with Theme 2! This page is jam-packed with all the necessary resources to take your testing to the next level. Whether you're a seasoned pro or just starting, our comprehensive collection of resources will help you improve your testing skills and achieve better results. Don't miss out on this incredible opportunity to access our exclusive resources. Check out our Testing Resources Page with Theme2 today!

Showing results 841 - 870 of 966
Showing results 841 - 870 of 966

Filter by

Filters

Dark Reading: Close the Visibility Gap

Dark Reading: Close the Visibility Gap

Stopping the New Breed of Advanced Encrypted Threats

Dark Reading: Close the Visibility Gap

Stopping the New Breed of Advanced Encrypted Threats
ExtraHop
Definitive Guide to Password Management for Small Businesses

Definitive Guide to Password Management for Small Businesses

How to support core departments and improve cybersecurity as your business grows

Definitive Guide to Password Management for Small Businesses

How to support core departments and improve cybersecurity as your business grows
Dashlane
Deliver Software Fast and Secure Infrastructure with Zero Trust Access

Deliver Software Fast and Secure Infrastructure with Zero Trust Access

Enforce Identity-Based Access through Cloud IAM, Key Vault Integration.

Deliver Software Fast and Secure Infrastructure with Zero Trust Access

Enforce Identity-Based Access through Cloud IAM, Key Vault Integration.
Appaegis
Deploying enterprise access browser to secure access of contractors and third-parties

Deploying enterprise access browser to secure access of contractors and third-parties

Shifts Driving the Need for A Modified Approach to Secure Cloud Access.

Deploying enterprise access browser to secure access of contractors and third-parties

Shifts Driving the Need for A Modified Approach to Secure Cloud Access.
Appaegis
Device Identity and Security Posture

Device Identity and Security Posture

How to Secure Your Business Services from Insecure Devices

Device Identity and Security Posture

How to Secure Your Business Services from Insecure Devices
Infinipoint
Do You Have What it Takes to Lead in Cybersecurity?

Do You Have What it Takes to Lead in Cybersecurity?

The number of cyberattacks businesses suffer each year is overwhelming.

Do You Have What it Takes to Lead in Cybersecurity?

The number of cyberattacks businesses suffer each year is overwhelming.
ISC2
Eliminate Exposed Identities

Eliminate Exposed Identities

Automatically discover and mitigate exploitable privileged identity risk with Illusive and Azure Active Directory.

Eliminate Exposed Identities

Automatically discover and mitigate exploitable privileged identity risk with Illusive and Azure Active Directory.
Illusive
Enterprise Access Browser for Zero Trust Access

Enterprise Access Browser for Zero Trust Access

Security Gaps in a Cloud Centric World.

Enterprise Access Browser for Zero Trust Access

Security Gaps in a Cloud Centric World.
Appaegis
ESG Showcase: A Network-Based Approach to Cloud Workload Security

ESG Showcase: A Network-Based Approach to Cloud Workload Security

The ‘Cloud’ Comes in Many Flavors, Leading to a Variety of Security Options

ESG Showcase: A Network-Based Approach to Cloud Workload Security

The ‘Cloud’ Comes in Many Flavors, Leading to a Variety of Security Options
ExtraHop
Essential Elements of Device Trust

Essential Elements of Device Trust

Apply Zero Trust to Devices and Fortify Your Enterprise Against Cyberattacks

Essential Elements of Device Trust

Apply Zero Trust to Devices and Fortify Your Enterprise Against Cyberattacks
Infinipoint
Exploring ZTNA as a Pillar of Zero Trust Initiatives

Exploring ZTNA as a Pillar of Zero Trust Initiatives

The State of Zero Trust Security Strategies

Exploring ZTNA as a Pillar of Zero Trust Initiatives

The State of Zero Trust Security Strategies
Menlo Security
False Positives in Web Application Security

False Positives in Web Application Security

As organizations evolve and their web application footprint grows, the number of false positives can rapidly increase and place a serious burden on developers and security teams, with negative consequences for the development process, application security, and business results.

False Positives in Web Application Security

As organizations evolve and their web application footprint grows, the number of false positives can rapidly increase and place a serious burden on developers and security teams, with negative consequences for the development process, application security, and business results.
Invicti
Field Guide #8: How to Simplify and Strengthen Security with Managed XDR

Field Guide #8: How to Simplify and Strengthen Security with Managed XDR

ISSUED: OCTOBER 2021

Field Guide #8: How to Simplify and Strengthen Security with Managed XDR

ISSUED: OCTOBER 2021
Optiv
Forrester Total Economic Impact Report Infographic

Forrester Total Economic Impact Report Infographic

How to Achieve Tangible Financial Gains and a Proactive Security Posture

Forrester Total Economic Impact Report Infographic

How to Achieve Tangible Financial Gains and a Proactive Security Posture
Team Cymru
Frictionless Cloud Threat Defense for AWS

Frictionless Cloud Threat Defense for AWS

Defend Your Cloud Without Friction

Frictionless Cloud Threat Defense for AWS

Defend Your Cloud Without Friction
ExtraHop
From Reactive to Proactive, Changing the Culture on API Security

From Reactive to Proactive, Changing the Culture on API Security

On Demand

From Reactive to Proactive, Changing the Culture on API Security

On Demand
Checkmarx
Gartner Hype Cycle for SecOps, 2021 Report

Gartner Hype Cycle for SecOps, 2021 Report

Cortex® by Palo Alto Networks is a single, adaptable platform for security operations to protect the entire organization

Gartner Hype Cycle for SecOps, 2021 Report

Cortex® by Palo Alto Networks is a single, adaptable platform for security operations to protect the entire organization
Palo Alto Networks
Gartner Market Guide for Managed Security Services

Gartner Market Guide for Managed Security Services

MSS has become a broad term to describe an overlay for a variety of different security services.

Gartner Market Guide for Managed Security Services

MSS has become a broad term to describe an overlay for a variety of different security services.
Trustwave
Gartner, Quick Answer: How Can Organizations Use DNS to Improve Their Security Posture?

Gartner, Quick Answer: How Can Organizations Use DNS to Improve Their Security Posture?

DNS presents security and risk management leaders with some excellent opportunities to anticipate, prevent, detect and respond to prevailing threats. Organizations should implement DNS security to protect users, devices and other critical infrastructure.

Gartner, Quick Answer: How Can Organizations Use DNS to Improve Their Security Posture?

DNS presents security and risk management leaders with some excellent opportunities to anticipate, prevent, detect and respond to prevailing threats. Organizations should implement DNS security to protect users, devices and other critical infrastructure.
Infoblox
Gone Phishing: How to Defend Against Persistent Phishing Attempts Targeting Your Organization

Gone Phishing: How to Defend Against Persistent Phishing Attempts Targeting Your Organization

Phishing is one of the most well-known cyberattack methods, but hackers still have considerable success despite security teams' best efforts.

Gone Phishing: How to Defend Against Persistent Phishing Attempts Targeting Your Organization

Phishing is one of the most well-known cyberattack methods, but hackers still have considerable success despite security teams' best efforts.
Rapid7
Guide to Preventing JavaScript Supply Chain Attacks

Guide to Preventing JavaScript Supply Chain Attacks

Common Code. Common Challenges.

Guide to Preventing JavaScript Supply Chain Attacks

Common Code. Common Challenges.
Feroot
Hacker Secrets Revealed

Hacker Secrets Revealed

Five Lessons Learned from Security Assessments

Hacker Secrets Revealed

Five Lessons Learned from Security Assessments
Motorola
Harnessing the Power of Security Automation

Harnessing the Power of Security Automation

DURATION: 1h 00min

Harnessing the Power of Security Automation

DURATION: 1h 00min
Qualys
How Augmedix Uses Trustwave MDR to Protect Vital Personal Healthcare Information

How Augmedix Uses Trustwave MDR to Protect Vital Personal Healthcare Information

The complete process of onboarding Augmedix onto Trustwave’s MDR platform lasted about three months

How Augmedix Uses Trustwave MDR to Protect Vital Personal Healthcare Information

The complete process of onboarding Augmedix onto Trustwave’s MDR platform lasted about three months
Trustwave
How Barclays Upskills a Global Security Team with RangeForce

How Barclays Upskills a Global Security Team with RangeForce

Security breaches present a serious risk to the financial services industry

How Barclays Upskills a Global Security Team with RangeForce

Security breaches present a serious risk to the financial services industry
Rangeforce
How Cybersecurity Became a Big Data Problem

How Cybersecurity Became a Big Data Problem

Human Security Operations Alone Struggle to Keep Pace

How Cybersecurity Became a Big Data Problem

Human Security Operations Alone Struggle to Keep Pace
Fortinet
How Dragos Activity Groups Obtain Initial Access into Industrial Environments

How Dragos Activity Groups Obtain Initial Access into Industrial Environments

As the threat landscape continues to evolve with a perpetual influx of new network anomalies and Indicators of Compromise (IOC), prudent defenders must focus on more actionable elements of attack characteristics, such as Tactics, Techniques and Procedures (TTPs).

How Dragos Activity Groups Obtain Initial Access into Industrial Environments

As the threat landscape continues to evolve with a perpetual influx of new network anomalies and Indicators of Compromise (IOC), prudent defenders must focus on more actionable elements of attack characteristics, such as Tactics, Techniques and Procedures (TTPs).
Dragos
How Enterprises Are Assessing Cybersecurity Risk in Today's Environment

How Enterprises Are Assessing Cybersecurity Risk in Today's Environment

Cloud and COVID-19 Elevate Enterprise Cyber-Risk

How Enterprises Are Assessing Cybersecurity Risk in Today's Environment

Cloud and COVID-19 Elevate Enterprise Cyber-Risk
Vulcan Cyber
How Enterprises Are Securing the Application Environment

How Enterprises Are Securing the Application Environment

Many IT teams have maintained their focus on application security last year, despite the challenges associated with operating during the global COVID-19 pandemic

How Enterprises Are Securing the Application Environment

Many IT teams have maintained their focus on application security last year, despite the challenges associated with operating during the global COVID-19 pandemic
Checkmarx
How Enterprises Plan to Address Endpoint Security Threats in a Post-Pandemic World

How Enterprises Plan to Address Endpoint Security Threats in a Post-Pandemic World

Many enterprises are building on the changes they made to their endpoint security strategies when the COVID-19 pandemic first forced a shift to remote work. Zero-trust network access, MFA, and EDR have emerged as major focus areas.

How Enterprises Plan to Address Endpoint Security Threats in a Post-Pandemic World

Many enterprises are building on the changes they made to their endpoint security strategies when the COVID-19 pandemic first forced a shift to remote work. Zero-trust network access, MFA, and EDR have emerged as major focus areas.
Fortinet
Daily news, dev blogs, and stories from Game Developer straight to your inbox