Sponsored By

Test Resources with Theme2

Attention! We are excited to announce that we launched a new Testing Resources Page with Theme 2! This page is jam-packed with all the necessary resources to take your testing to the next level. Whether you're a seasoned pro or just starting, our comprehensive collection of resources will help you improve your testing skills and achieve better results. Don't miss out on this incredible opportunity to access our exclusive resources. Check out our Testing Resources Page with Theme2 today!

Showing results 181 - 210 of 1003
Showing results 181 - 210 of 1003

Filter by

Filters

Preventing Domain Impersonation: How to Stop Look-Alike Domains and Spoofing

Preventing Domain Impersonation: How to Stop Look-Alike Domains and Spoofing

Cybercriminals spoof domains for lucrative gains. This whitepaper examines how to protect your domains from impersonation.

Preventing Domain Impersonation: How to Stop Look-Alike Domains and Spoofing

Cybercriminals spoof domains for lucrative gains. This whitepaper examines how to protect your domains from impersonation.
Fortra
All the Ways the Internet is Surveilling You

All the Ways the Internet is Surveilling You

Thursday, July 25, 2024 at 1 PM EST

All the Ways the Internet is Surveilling You

Thursday, July 25, 2024 at 1 PM EST
Knowbe4
Protecting the Crown Jewels: Source Code Security

Protecting the Crown Jewels: Source Code Security

Tuesday, July 16, 2024 at 1 PM EDT | Brought to you by Mend.io

Protecting the Crown Jewels: Source Code Security

Tuesday, July 16, 2024 at 1 PM EDT | Brought to you by Mend.io
Mend.io
State of Enterprise Cloud Security

State of Enterprise Cloud Security

Rising cloud adoption trends have put organizations on high alert for a wide range of associated security issues.

State of Enterprise Cloud Security

Rising cloud adoption trends have put organizations on high alert for a wide range of associated security issues.
Google Cloud
2024 LevelBlue Futures� Report: Cyber Resilience

2024 LevelBlue Futures� Report: Cyber Resilience

Unveil Tomorrow's Security Today! Dive into the 2024 LevelBlue Futures™ Report: Cyber Resilience. Discover the secrets to strengthening your digital fortress against evolving threats. Don't just survive, thrive in the cyber age. Get your exclusive copy now!

2024 LevelBlue Futures� Report: Cyber Resilience

Unveil Tomorrow's Security Today! Dive into the 2024 LevelBlue Futures™ Report: Cyber Resilience. Discover the secrets to strengthening your digital fortress against evolving threats. Don't just survive, thrive in the cyber age. Get your exclusive copy now!
LevelBlue
LevelBlue Futures™ 2024 Report: Cyber Resilience

LevelBlue Futures™ 2024 Report: Cyber Resilience

Unveil Tomorrow's Security Today! Dive into the 2024 LevelBlue Futures™ Report: Cyber Resilience. Discover the secrets to strengthening your digital fortress against evolving threats. Don't just survive, thrive in the cyber age. Get your exclusive copy now!

LevelBlue Futures™ 2024 Report: Cyber Resilience

Unveil Tomorrow's Security Today! Dive into the 2024 LevelBlue Futures™ Report: Cyber Resilience. Discover the secrets to strengthening your digital fortress against evolving threats. Don't just survive, thrive in the cyber age. Get your exclusive copy now!
LevelBlue
Google Cloud Security Foundations for Dummies

Google Cloud Security Foundations for Dummies

The complete guide to protect everything you build and run on Google Cloud

Google Cloud Security Foundations for Dummies

The complete guide to protect everything you build and run on Google Cloud
Wiz
The Ultimate Guide for Evaluating Cloud Security Solutions

The Ultimate Guide for Evaluating Cloud Security Solutions

Everything you need to know when evaluating cloud security solutions

The Ultimate Guide for Evaluating Cloud Security Solutions

Everything you need to know when evaluating cloud security solutions
Wiz
A Year in Review of Zero-Days Exploited In-the-Wild in 2023

A Year in Review of Zero-Days Exploited In-the-Wild in 2023

Google observed 97 zero-day vulnerabilities exploited in-the-wild in 2023, over 50 percent more than 2022 (62 vulnerabilities). This report shares the combined analysis of Google’s Threat Analysis Group (TAG) and Mandiant and includes: trends, gaps, lessons learned, and successes across the year as a whole.

A Year in Review of Zero-Days Exploited In-the-Wild in 2023

Google observed 97 zero-day vulnerabilities exploited in-the-wild in 2023, over 50 percent more than 2022 (62 vulnerabilities). This report shares the combined analysis of Google’s Threat Analysis Group (TAG) and Mandiant and includes: trends, gaps, lessons learned, and successes across the year as a whole.
Google Cloud Security
Google Cloud Threat Horizons Report, H1 2024

Google Cloud Threat Horizons Report, H1 2024

Get insights and recommendations from cybersecurity experts in the latest edition of our Google Cloud Threat Horizons Report. Learn how you can defend your organization against emerging threats and stay ahead of threat actors’ evolving tactics.

Google Cloud Threat Horizons Report, H1 2024

Get insights and recommendations from cybersecurity experts in the latest edition of our Google Cloud Threat Horizons Report. Learn how you can defend your organization against emerging threats and stay ahead of threat actors’ evolving tactics.
Google Cloud Security
Google Threat Intelligence

Google Threat Intelligence

Google Threat Intelligence has unmatched visibility into threats enabling us to deliver detailed and timely threat intelligence to security teams around the world. With a diverse set of intelligence sources, Google is able to provide unmatched breadth and depth to this visibility.

Google Threat Intelligence

Google Threat Intelligence has unmatched visibility into threats enabling us to deliver detailed and timely threat intelligence to security teams around the world. With a diverse set of intelligence sources, Google is able to provide unmatched breadth and depth to this visibility.
Google Cloud Security
How Cyber Threat Intelligence Empowers the C-Suite

How Cyber Threat Intelligence Empowers the C-Suite

Learn how cyber threat intelligence teams who understand the relevance of risk management practices can influence C-suite executives and board members more effectively.

How Cyber Threat Intelligence Empowers the C-Suite

Learn how cyber threat intelligence teams who understand the relevance of risk management practices can influence C-suite executives and board members more effectively.
Google Cloud Security
The Forrester Wave�: External Threat Intelligence Service Providers, Q3 2023

The Forrester Wave�: External Threat Intelligence Service Providers, Q3 2023

Google was named a Leader in The Forrester Wave™: External Threat Intelligence Service Providers, Q3 2023. Forrester identified 12 top companies in the threat intelligence space and Google received the highest possible score in 15 out of the 29 criteria.

The Forrester Wave�: External Threat Intelligence Service Providers, Q3 2023

Google was named a Leader in The Forrester Wave™: External Threat Intelligence Service Providers, Q3 2023. Forrester identified 12 top companies in the threat intelligence space and Google received the highest possible score in 15 out of the 29 criteria.
Google Cloud Security
2024 Penetration Testing Report

2024 Penetration Testing Report

Offensive cybersecurity practices like pen testing stand apart from other security methods. By learning how other organizations are utilizing penetration testing, we gain valuable perspectives on the efficacy of different approaches, challenges encountered, and lessons learned. Read the report to understand the current state of pen testing practices, providing ongoing, useful data on the following key issues related to pen testing.

2024 Penetration Testing Report

Offensive cybersecurity practices like pen testing stand apart from other security methods. By learning how other organizations are utilizing penetration testing, we gain valuable perspectives on the efficacy of different approaches, challenges encountered, and lessons learned. Read the report to understand the current state of pen testing practices, providing ongoing, useful data on the following key issues related to pen testing.
Fortra
A Simple Guide to Successful Red Teaming

A Simple Guide to Successful Red Teaming

Red Teaming simulates malicious activities of a long-term adversary embedded in a network to test an organization’s ability to detect and respond to intrusions. Read the guide to learn about benefits of red teaming, use cases, and how to maximize your red team engagement

A Simple Guide to Successful Red Teaming

Red Teaming simulates malicious activities of a long-term adversary embedded in a network to test an organization’s ability to detect and respond to intrusions. Read the guide to learn about benefits of red teaming, use cases, and how to maximize your red team engagement
Fortra
Managing your Attack Surface

Managing your Attack Surface

Every point in your organization that provides access to data is what’s known as your attack surface. Your attack surface includes both digital and physical endpoints. It’s vital to understand what it is and how to protect it. Read this guide to understand the breadth of the attack surface and how organizations can effectively manage it to reduce risk.

Managing your Attack Surface

Every point in your organization that provides access to data is what’s known as your attack surface. Your attack surface includes both digital and physical endpoints. It’s vital to understand what it is and how to protect it. Read this guide to understand the breadth of the attack surface and how organizations can effectively manage it to reduce risk.
Fortra
The Complete Guide to Layering Offensive Security

The Complete Guide to Layering Offensive Security

Offensive security is when organization takes steps to actively anticipate and prevent cyberattacks instead of only reacting once an attack has occurred. The best offensive security takes a layered approach to identify vulnerabilities and exposures. Read the guide to understand how your organization can layer offensive security tactics into a holistic security strategy.

The Complete Guide to Layering Offensive Security

Offensive security is when organization takes steps to actively anticipate and prevent cyberattacks instead of only reacting once an attack has occurred. The best offensive security takes a layered approach to identify vulnerabilities and exposures. Read the guide to understand how your organization can layer offensive security tactics into a holistic security strategy.
Fortra
2024 Global Cyber Confidence Index

2024 Global Cyber Confidence Index

How confident are you in your organization’s ability to manage cyber risk?

2024 Global Cyber Confidence Index

How confident are you in your organization’s ability to manage cyber risk?
ExtraHop
Are You Ready for Ransomware?

Are You Ready for Ransomware?

Ransomware attacks are on the rise. Are you ready?

Are You Ready for Ransomware?

Ransomware attacks are on the rise. Are you ready?
ExtraHop
BAS as the Keystone of Security Validation in Multi-Layered Defense

BAS as the Keystone of Security Validation in Multi-Layered Defense

Discover how Breach and Attack Simulation (BAS) is pivotal in continuously validating security across every layer of defense, essential for adapting to the dynamic cyber threat environment.

BAS as the Keystone of Security Validation in Multi-Layered Defense

Discover how Breach and Attack Simulation (BAS) is pivotal in continuously validating security across every layer of defense, essential for adapting to the dynamic cyber threat environment.
Picus
Double Your Threat Blocking in 90 Days

Double Your Threat Blocking in 90 Days

Learn how Breach and Attack Simulation optimizes your prevention and detection controls - enabling you to block twice as many threats in just your first 90 days.

Double Your Threat Blocking in 90 Days

Learn how Breach and Attack Simulation optimizes your prevention and detection controls - enabling you to block twice as many threats in just your first 90 days.
Picus
Ridge Security's AI-Driven Security Validation Gives Unparalleled Power to Cyber Defenders

Ridge Security's AI-Driven Security Validation Gives Unparalleled Power to Cyber Defenders

As organizations face evolving threats, integrating AI into cybersecurity brings an intelligent, iterative, and continuous learning force with unparalleled opportunities to enhance defense mechanisms, streamline processes, and mitigate risks more effectively.

Ridge Security's AI-Driven Security Validation Gives Unparalleled Power to Cyber Defenders

As organizations face evolving threats, integrating AI into cybersecurity brings an intelligent, iterative, and continuous learning force with unparalleled opportunities to enhance defense mechanisms, streamline processes, and mitigate risks more effectively.
Ridge Security
Security Validation Testing: Comparing Breach and Attack Simulation with Traditional Methods

Security Validation Testing: Comparing Breach and Attack Simulation with Traditional Methods

Explore the advantages of Breach and Attack Simulation (BAS) over red teaming, vulnerability management, and automated penetration testing as the superior choice for security validation and cyber threat exposure management (CTEM).

Security Validation Testing: Comparing Breach and Attack Simulation with Traditional Methods

Explore the advantages of Breach and Attack Simulation (BAS) over red teaming, vulnerability management, and automated penetration testing as the superior choice for security validation and cyber threat exposure management (CTEM).
Picus
The Dangers of Cyber Risk Quantification

The Dangers of Cyber Risk Quantification

Reporting on cyber risk can get risky. Three current and former CISOs share their experiences.

The Dangers of Cyber Risk Quantification

Reporting on cyber risk can get risky. Three current and former CISOs share their experiences.
ExtraHop
The How to Survive the Ransomware Rampage

The How to Survive the Ransomware Rampage

Several trends are fueling the rapid rise in both frequency and size of cyberattacks. Threat actors are also adjusting their playbook for higher-impact targets to gain larger and more assured payouts. Harden your assets against Ransomware today.

The How to Survive the Ransomware Rampage

Several trends are fueling the rapid rise in both frequency and size of cyberattacks. Threat actors are also adjusting their playbook for higher-impact targets to gain larger and more assured payouts. Harden your assets against Ransomware today.
Ridge Security
The State of Threat Exposure Management

The State of Threat Exposure Management

Learn about the four 'impossible' tradeoffs security teams are making and how to navigate these with Continuous Threat Exposure Management.

The State of Threat Exposure Management

Learn about the four 'impossible' tradeoffs security teams are making and how to navigate these with Continuous Threat Exposure Management.
Picus
The True Cost of a Security Breach

The True Cost of a Security Breach

Can your organization afford a data breach?

The True Cost of a Security Breach

Can your organization afford a data breach?
ExtraHop
Unlock External Exposure Management with Ridge Security

Unlock External Exposure Management with Ridge Security

Managed Security Service Providers (MSSP) and Managed Detection and Response (MDR) providers are building out adjacent service capabilities to help customers manage this increasingly complex and distributed landscape. Ridge Security’s MSSP program is designed to help you achieve these business benefits with award-winning tools, targeted exposure management capabilities and easy API integration.

Unlock External Exposure Management with Ridge Security

Managed Security Service Providers (MSSP) and Managed Detection and Response (MDR) providers are building out adjacent service capabilities to help customers manage this increasingly complex and distributed landscape. Ridge Security’s MSSP program is designed to help you achieve these business benefits with award-winning tools, targeted exposure management capabilities and easy API integration.
Ridge Security
Effective Asset Management Is Critical to Enterprise Cybersecurity

Effective Asset Management Is Critical to Enterprise Cybersecurity

An enterprise cannot protect the business without knowing what devices and software it has -- on-premises, cloud, and spaces in between -- yet few organizations have effective asset management in place. Organizations need to take a holistic approach with automated discovery tools, robust data management processes, governance frameworks, and collaboration across teams. This report discusses how to set up asset management programs that help reduce risk and maintain a secure digital footprint.

Effective Asset Management Is Critical to Enterprise Cybersecurity

An enterprise cannot protect the business without knowing what devices and software it has -- on-premises, cloud, and spaces in between -- yet few organizations have effective asset management in place. Organizations need to take a holistic approach with automated discovery tools, robust data management processes, governance frameworks, and collaboration across teams. This report discusses how to set up asset management programs that help reduce risk and maintain a secure digital footprint.
Panaseer
How to Use Threat Intelligence to Mitigate Third Party Risk

How to Use Threat Intelligence to Mitigate Third Party Risk

Wednesday, July 10, 2024 at 1 PM EDT | Brought to you by Cyble

How to Use Threat Intelligence to Mitigate Third Party Risk

Wednesday, July 10, 2024 at 1 PM EDT | Brought to you by Cyble
Cyble
Daily news, dev blogs, and stories from Game Developer straight to your inbox