Sponsored By

Test Resources with Theme2

Attention! We are excited to announce that we launched a new Testing Resources Page with Theme 2! This page is jam-packed with all the necessary resources to take your testing to the next level. Whether you're a seasoned pro or just starting, our comprehensive collection of resources will help you improve your testing skills and achieve better results. Don't miss out on this incredible opportunity to access our exclusive resources. Check out our Testing Resources Page with Theme2 today!

Showing results 91 - 120 of 999
Showing results 91 - 120 of 999

Filter by

Filters

When Cyber Resilience Lags IT Exploits, Automation is the Answer

When Cyber Resilience Lags IT Exploits, Automation is the Answer

Rapidly evolving cyber threats demand a proactive approach: Cyber Resilience. By prioritizing this strategic imperative, organizations can effectively mitigate risk and ensure business continuity in the face of increasing digital complexity.

When Cyber Resilience Lags IT Exploits, Automation is the Answer

Rapidly evolving cyber threats demand a proactive approach: Cyber Resilience. By prioritizing this strategic imperative, organizations can effectively mitigate risk and ensure business continuity in the face of increasing digital complexity.
BackBox Software
Simplify Data Security with Automation

Simplify Data Security with Automation

Wednesday, October 30, 2024 at 1PM ET

Simplify Data Security with Automation

Wednesday, October 30, 2024 at 1PM ET
Rubrik
Anatomy of a Successful DevSecOps Program

Anatomy of a Successful DevSecOps Program

Wednesday, October 16, 2024 at 1 PM EDT

Anatomy of a Successful DevSecOps Program

Wednesday, October 16, 2024 at 1 PM EDT
Snyk
Cloud Data Protection Checklist for IT and Security Teams

Cloud Data Protection Checklist for IT and Security Teams

This Cloud Data Protection Checklist is a comprehensive list to help IT and security teams ensure they are implementing the best practices for safeguarding their valuable data. From encryption and access controls to data loss prevention and incident response, this checklist provides the necessary steps to ensure your data remains secure and protected from potential threats.

Cloud Data Protection Checklist for IT and Security Teams

This Cloud Data Protection Checklist is a comprehensive list to help IT and security teams ensure they are implementing the best practices for safeguarding their valuable data. From encryption and access controls to data loss prevention and incident response, this checklist provides the necessary steps to ensure your data remains secure and protected from potential threats.
Lookout
Data and Identity: The Evolving Security Paradigm

Data and Identity: The Evolving Security Paradigm

Data and identity have become the primary targets for cyberattacks, driven by the exponential growth in data volumes and the increasing complexity of identity management.

Data and Identity: The Evolving Security Paradigm

Data and identity have become the primary targets for cyberattacks, driven by the exponential growth in data volumes and the increasing complexity of identity management.
Cyera
Disaster Recovery Case Study

Disaster Recovery Case Study

Learn why this organization relies on Lookout's built-in data loss prevention (DLP) to safeguard their sensitive cloud data.

Disaster Recovery Case Study

Learn why this organization relies on Lookout's built-in data loss prevention (DLP) to safeguard their sensitive cloud data.
Lookout
How to Build an Effective Data Security Strategy

How to Build an Effective Data Security Strategy

Ensure all of your devices are secure. Learn the steps you need to take in order to build a comprehensive data security strategy.

How to Build an Effective Data Security Strategy

Ensure all of your devices are secure. Learn the steps you need to take in order to build a comprehensive data security strategy.
Lookout
SSE Buyer's Guide

SSE Buyer's Guide

SSE addresses modern enterprise challenges in cloud, remote work, and digital transformation. Here's how to select the best option for your organization.

SSE Buyer's Guide

SSE addresses modern enterprise challenges in cloud, remote work, and digital transformation. Here's how to select the best option for your organization.
Lookout
Top 3 Cloud Security Myths: Why Lookout makes protecting cloud data easy and cost-effective

Top 3 Cloud Security Myths: Why Lookout makes protecting cloud data easy and cost-effective

Reliable cloud security doesn’t need to be costly or complex. Learn how Lookout makes protecting cloud data easy and cost-effective.

Top 3 Cloud Security Myths: Why Lookout makes protecting cloud data easy and cost-effective

Reliable cloud security doesn’t need to be costly or complex. Learn how Lookout makes protecting cloud data easy and cost-effective.
Lookout
From Reactive to Proactive : How Allowlisting Turns the Tables on Zero-Day Vulnerabilities

From Reactive to Proactive : How Allowlisting Turns the Tables on Zero-Day Vulnerabilities

Thursday, October 17, 2024 at 1 PM EST

From Reactive to Proactive : How Allowlisting Turns the Tables on Zero-Day Vulnerabilities

Thursday, October 17, 2024 at 1 PM EST
ThreatLocker
10 Emerging Vulnerabilities Every Enterprise Should Know

10 Emerging Vulnerabilities Every Enterprise Should Know

Tuesday, October 29, 2024 at 1 PM EST

10 Emerging Vulnerabilities Every Enterprise Should Know

Tuesday, October 29, 2024 at 1 PM EST
Censys
2024 Cloud Security Report

2024 Cloud Security Report

Cloud security continues to be a critical concern as organizations increasingly leverage multi-cloud environments to drive business growth and innovation.

2024 Cloud Security Report

Cloud security continues to be a critical concern as organizations increasingly leverage multi-cloud environments to drive business growth and innovation.
Trend Micro (TM)
Building Blocks for Next-Generation Security Operations

Building Blocks for Next-Generation Security Operations

Tuesday, October 15, 2024 at 1PM EDT

Building Blocks for Next-Generation Security Operations

Tuesday, October 15, 2024 at 1PM EDT
Optiv
Product Review: Trend Vision One Cloud Security

Product Review: Trend Vision One Cloud Security

Amidst evolving cybersecurity challenges, including sophisticated cyber-attacks, cloud vulnerabilities, and the expansion of attack surfaces, there is an acute need for solutions that not only detect and respond to threats but also provide comprehensive visibility and risk management across diverse infrastructures.

Product Review: Trend Vision One Cloud Security

Amidst evolving cybersecurity challenges, including sophisticated cyber-attacks, cloud vulnerabilities, and the expansion of attack surfaces, there is an acute need for solutions that not only detect and respond to threats but also provide comprehensive visibility and risk management across diverse infrastructures.
Trend Micro (TM)
Get In Tune with Your Cloud Cyber Resilience Strategy

Get In Tune with Your Cloud Cyber Resilience Strategy

Tuesday, October 8, 2024 at 1PM ET

Get In Tune with Your Cloud Cyber Resilience Strategy

Tuesday, October 8, 2024 at 1PM ET
Rubrik
2024 State of Code Security Report

2024 State of Code Security Report

Organizations are boldly embracing AppSec, but still struggle to secure what matters most due to funding, resources, and DevSec disconnects.

2024 State of Code Security Report

Organizations are boldly embracing AppSec, but still struggle to secure what matters most due to funding, resources, and DevSec disconnects.
OpenText
Beyond DLP: Embracing the New Necessities of Data Security

Beyond DLP: Embracing the New Necessities of Data Security

Read the eBook to learn why DSPM is a critical component of data security programs in the age of AI, and how organizations are adapting to the changing digital landscape to secure their sensitive data.

Beyond DLP: Embracing the New Necessities of Data Security

Read the eBook to learn why DSPM is a critical component of data security programs in the age of AI, and how organizations are adapting to the changing digital landscape to secure their sensitive data.
Cyera
Bridging the Gap: How Security Teams Can Engage Developers in Security Programs

Bridging the Gap: How Security Teams Can Engage Developers in Security Programs

Application security has become a critical priority as cyberattacks grow more frequent and sophisticated.

Bridging the Gap: How Security Teams Can Engage Developers in Security Programs

Application security has become a critical priority as cyberattacks grow more frequent and sophisticated.
Snyk
Building a World-Class Security Champions Program

Building a World-Class Security Champions Program

Embedding Security Champions within development teams can effectively scale their security efforts in your organization. This decentralized method ensures consistent application of security practices across all projects and teams. Snyk’s latest technical guide outlines 7 steps to establish a successful Security Champions program in your organization.

Building a World-Class Security Champions Program

Embedding Security Champions within development teams can effectively scale their security efforts in your organization. This decentralized method ensures consistent application of security practices across all projects and teams. Snyk’s latest technical guide outlines 7 steps to establish a successful Security Champions program in your organization.
Snyk
Case Study: How a multinational pharmaceutical company uses Cyera to improve data security and compliance

Case Study: How a multinational pharmaceutical company uses Cyera to improve data security and compliance

Download the case study to learn how a multinational pharmaceutical company uses Cyera to improve data security and compliance.

Case Study: How a multinational pharmaceutical company uses Cyera to improve data security and compliance

Download the case study to learn how a multinational pharmaceutical company uses Cyera to improve data security and compliance.
Cyera
Cloud Cost Optimization Guide

Cloud Cost Optimization Guide

CISOs must balance the competing demands of improving security, while also consolidating resources. This task is made all the more challenging by business growth which can expand attack surfaces. View this paper to examine how cloud optimization can reduce costs while improving security and compliance.

Cloud Cost Optimization Guide

CISOs must balance the competing demands of improving security, while also consolidating resources. This task is made all the more challenging by business growth which can expand attack surfaces. View this paper to examine how cloud optimization can reduce costs while improving security and compliance.
Cyera
DSPM Buyer's Guide

DSPM Buyer's Guide

Download the DSPM Buyer's Guide to learn what to look for in a DSPM solution, key considerations when evaluating DSPM solutions, and how to spot a legacy approach claiming "DSPM".

DSPM Buyer's Guide

Download the DSPM Buyer's Guide to learn what to look for in a DSPM solution, key considerations when evaluating DSPM solutions, and how to spot a legacy approach claiming "DSPM".
Cyera
From basics to best practices: Building a strong AppSec program

From basics to best practices: Building a strong AppSec program

Are you aiming to build a stronger AppSec program but unsure how to effectively involve your developers? Inside you’ll learn how to select the right SAST and SCA tools, foster a security-centric developer culture and address slow tool performance while building a resilient application infrastructure.

From basics to best practices: Building a strong AppSec program

Are you aiming to build a stronger AppSec program but unsure how to effectively involve your developers? Inside you’ll learn how to select the right SAST and SCA tools, foster a security-centric developer culture and address slow tool performance while building a resilient application infrastructure.
Snyk
Gartner Leader's Guide to Software Supply Chain Security

Gartner Leader's Guide to Software Supply Chain Security

Software supply chain security is a critical risk and compliance issue, but most organizations approach it in a fragmented way.

Gartner Leader's Guide to Software Supply Chain Security

Software supply chain security is a critical risk and compliance issue, but most organizations approach it in a fragmented way.
OpenText
Gartner Magic Quadrant for Application Security Testing

Gartner Magic Quadrant for Application Security Testing

When it comes to application security, it’s important to align yourself with an experienced partner you can trust.

Gartner Magic Quadrant for Application Security Testing

When it comes to application security, it’s important to align yourself with an experienced partner you can trust.
OpenText
IDC White Paper: The Peril and Promise of Generative AI in Application Security

IDC White Paper: The Peril and Promise of Generative AI in Application Security

As the adoption of generative AI (GenAI) accelerates, so does the frequency and sophistication of attacks on AI systems.

IDC White Paper: The Peril and Promise of Generative AI in Application Security

As the adoption of generative AI (GenAI) accelerates, so does the frequency and sophistication of attacks on AI systems.
OpenText
Dependency Automation: Developer Delight & Security Satisfaction

Dependency Automation: Developer Delight & Security Satisfaction

Tuesday, October 1, 2024 at 1 PM EDT

Dependency Automation: Developer Delight & Security Satisfaction

Tuesday, October 1, 2024 at 1 PM EDT
Mend
How to Find Your Most Critical Risks in the Cloud

How to Find Your Most Critical Risks in the Cloud

Wednesday, October 9, 2024 at 1:00pm EDT

How to Find Your Most Critical Risks in the Cloud

Wednesday, October 9, 2024 at 1:00pm EDT
Wiz
DORA and PCI DSS 4.0: Scale Your Mainframe Security Strategy Among Evolving Regulations

DORA and PCI DSS 4.0: Scale Your Mainframe Security Strategy Among Evolving Regulations

Thursday, September 26, 2024 at 1PM EDT

DORA and PCI DSS 4.0: Scale Your Mainframe Security Strategy Among Evolving Regulations

Thursday, September 26, 2024 at 1PM EDT
Rocket Software
Achieving CMMC Compliance with CTEM

Achieving CMMC Compliance with CTEM

Achieve CMMC compliance with ease by leveraging Continuous Threat Exposure Management (CTEM). Discover actionable strategies to enhance your security posture and safeguard sensitive data from evolving threats

Achieving CMMC Compliance with CTEM

Achieve CMMC compliance with ease by leveraging Continuous Threat Exposure Management (CTEM). Discover actionable strategies to enhance your security posture and safeguard sensitive data from evolving threats
Praetorian
Daily news, dev blogs, and stories from Game Developer straight to your inbox