Sponsored By

Test Resources with Theme2

Attention! We are excited to announce that we launched a new Testing Resources Page with Theme 2! This page is jam-packed with all the necessary resources to take your testing to the next level. Whether you're a seasoned pro or just starting, our comprehensive collection of resources will help you improve your testing skills and achieve better results. Don't miss out on this incredible opportunity to access our exclusive resources. Check out our Testing Resources Page with Theme2 today!

Showing results 211 - 240 of 966
Showing results 211 - 240 of 966

Filter by

Filters

The Forrester Wave�: Governance, Risk, And Compliance Platforms, Q4 2023

The Forrester Wave�: Governance, Risk, And Compliance Platforms, Q4 2023

The 15 most significant GRC vendors from top analyst firm.

The Forrester Wave�: Governance, Risk, And Compliance Platforms, Q4 2023

The 15 most significant GRC vendors from top analyst firm.
LogicGate
The State of Incident Response

The State of Incident Response

IT and cybersecurity teams are confident about their incident response practices as they evolve into a collaborative effort integrating cross-functional teams and external partners. Learn more about

The State of Incident Response

IT and cybersecurity teams are confident about their incident response practices as they evolve into a collaborative effort integrating cross-functional teams and external partners. Learn more about
Fortinet
10 Ways Asset Visibility Build the Foundation for OT Cybersecurity

10 Ways Asset Visibility Build the Foundation for OT Cybersecurity

This whitepaper provides insight into 10 distinct ways that asset visibility helps inform a broader strategy for OT visibility

10 Ways Asset Visibility Build the Foundation for OT Cybersecurity

This whitepaper provides insight into 10 distinct ways that asset visibility helps inform a broader strategy for OT visibility
Dragos, Inc.
5 Critical Controls for World-Class OT Cybersecurity

5 Critical Controls for World-Class OT Cybersecurity

Download this free guide to discover the key components of a world-class OT cybersecurity program.

5 Critical Controls for World-Class OT Cybersecurity

Download this free guide to discover the key components of a world-class OT cybersecurity program.
Dragos, Inc.
A deep dive into OWASP MASVS-Resilience

A deep dive into OWASP MASVS-Resilience

We've broken down the OWASP MASVS (Mobile Application Security Verification Standard) framework into digestible and actionable sections with helpful callouts and visualizations to help guide teams that are focused on mobile app security and resiliency.

A deep dive into OWASP MASVS-Resilience

We've broken down the OWASP MASVS (Mobile Application Security Verification Standard) framework into digestible and actionable sections with helpful callouts and visualizations to help guide teams that are focused on mobile app security and resiliency.
Promon
App Threat Report: The State of iOS App Security

App Threat Report: The State of iOS App Security

Are iOS apps more secure than Android? We put them to the test. Our security research team tested the 100 most downloaded iOS apps in the world against a repackaging attack. The results were startling: 93% of the apps were vulnerable! Download a copy of the latest App Threat Report for the full results.

App Threat Report: The State of iOS App Security

Are iOS apps more secure than Android? We put them to the test. Our security research team tested the 100 most downloaded iOS apps in the world against a repackaging attack. The results were startling: 93% of the apps were vulnerable! Download a copy of the latest App Threat Report for the full results.
Promon
VOLTZITE Espionage Operations Targeting U.S. Critical Systems

VOLTZITE Espionage Operations Targeting U.S. Critical Systems

This Intelligence Brief shares information Dragos Intelligence has collected on these espionage operations targeting of U.S. critical infrastructure, with clear guidance for OT asset owners and operators on how to defend against stealthy operators like VOLTZITE.

VOLTZITE Espionage Operations Targeting U.S. Critical Systems

This Intelligence Brief shares information Dragos Intelligence has collected on these espionage operations targeting of U.S. critical infrastructure, with clear guidance for OT asset owners and operators on how to defend against stealthy operators like VOLTZITE.
Dragos, Inc.
Upgrade your cybersecurity in the era of AI

Upgrade your cybersecurity in the era of AI

Upgrade your cybersecurity in the era of AI

Upgrade your cybersecurity in the era of AI

Upgrade your cybersecurity in the era of AI
Microsoft
Gcore Radar

Gcore Radar

Gcore Radar is a twice-annual report on key trends in the ever-evolving DDoS landscape. Data includes most-targeted industries, prevalence of attack types, attack characteristics and trends, and common perpetrator and victim locations. The publication equips readers with actionable intelligence to make informed decisions about their cybersecurity strategy.

Gcore Radar

Gcore Radar is a twice-annual report on key trends in the ever-evolving DDoS landscape. Data includes most-targeted industries, prevalence of attack types, attack characteristics and trends, and common perpetrator and victim locations. The publication equips readers with actionable intelligence to make informed decisions about their cybersecurity strategy.
Gcore
How To Optimize and Accelerate Cybersecurity Initiatives for Your Business

How To Optimize and Accelerate Cybersecurity Initiatives for Your Business

| Live Webinar | Tuesday, March 26, 2024 | 1pm ET |

How To Optimize and Accelerate Cybersecurity Initiatives for Your Business

| Live Webinar | Tuesday, March 26, 2024 | 1pm ET |
Mandiant
Collective defense is more important than ever--is your workforce ready?

Collective defense is more important than ever--is your workforce ready?

Access exclusive insights and strategies on how to utilize collective defense against surging Cyber threats with Microsoft's integrated AI and human-centric approach to Cybersecurity.

Collective defense is more important than ever--is your workforce ready?

Access exclusive insights and strategies on how to utilize collective defense against surging Cyber threats with Microsoft's integrated AI and human-centric approach to Cybersecurity.
Microsoft
Unleash the Power of Gen AI for Application Development, Securely

Unleash the Power of Gen AI for Application Development, Securely

Available On-Demand

Unleash the Power of Gen AI for Application Development, Securely

Available On-Demand
Snyk
How Hackers Execute Mobile Attacks

How Hackers Execute Mobile Attacks

View the report explaining the anatomy of mobile attacks and discover security measures.

How Hackers Execute Mobile Attacks

View the report explaining the anatomy of mobile attacks and discover security measures.
Zimperium
Mobile Banking Heist Report

Mobile Banking Heist Report

Banking trojans continue to evolve and succeed due to their ability to persist, bypass security, and evade detection on mobile devices. In this report, Zimperium shares insights on how to develop mobile app security strategies that align with today's sophisticated malware.

Mobile Banking Heist Report

Banking trojans continue to evolve and succeed due to their ability to persist, bypass security, and evade detection on mobile devices. In this report, Zimperium shares insights on how to develop mobile app security strategies that align with today's sophisticated malware.
Zimperium
OWASP Mobile Top 10 List: Why Publish a Separate List for Mobile?

OWASP Mobile Top 10 List: Why Publish a Separate List for Mobile?

OWASPs top 10 lists reveal the biggest risks and the best mitigation strategies. Learn why they’re important and why there are different lists for web apps and mobile apps.

OWASP Mobile Top 10 List: Why Publish a Separate List for Mobile?

OWASPs top 10 lists reveal the biggest risks and the best mitigation strategies. Learn why they’re important and why there are different lists for web apps and mobile apps.
Zimperium
State of Mobile App Security

State of Mobile App Security

Mobile apps have rapidly transformed; with improved internet speeds and the global demand for instant access to data and services, mobile apps have become a dominant form of digital interaction in our work and personal lives, discover in Zimperium's report.

State of Mobile App Security

Mobile apps have rapidly transformed; with improved internet speeds and the global demand for instant access to data and services, mobile apps have become a dominant form of digital interaction in our work and personal lives, discover in Zimperium's report.
Zimperium
Zimperium Secures Connected Apps for Leading Medical Device Manufacturer

Zimperium Secures Connected Apps for Leading Medical Device Manufacturer

Discover how Zimperium helped a major healthcare and pharmaceutical manufacturer secure their connected apps all while protecting patient data, complying with FDA security requirements and more.

Zimperium Secures Connected Apps for Leading Medical Device Manufacturer

Discover how Zimperium helped a major healthcare and pharmaceutical manufacturer secure their connected apps all while protecting patient data, complying with FDA security requirements and more.
Zimperium
2023 Threat Detection Report

2023 Threat Detection Report

Understand prevalent trends, cyber threats, and adversary techniques.

2023 Threat Detection Report

Understand prevalent trends, cyber threats, and adversary techniques.
Red Canary
Executive Summary: Incident Response & Readiness

Executive Summary: Incident Response & Readiness

What security leadership needs to know right now

Executive Summary: Incident Response & Readiness

What security leadership needs to know right now
Red Canary
Incident Response & Readiness Guide

Incident Response & Readiness Guide

Timing and response plans could mean the difference between an attempted attack or full-blown compromise. This guide arms security teams with the blueprint for a modern and effective incident response plan.

Incident Response & Readiness Guide

Timing and response plans could mean the difference between an attempted attack or full-blown compromise. This guide arms security teams with the blueprint for a modern and effective incident response plan.
Red Canary
MDR Buyer's Guide

MDR Buyer's Guide

When evaluating MDR vendors, organizations should consider several elements, from the provider’s investigation and response capabilities to their depth of detection and beyond.

MDR Buyer's Guide

When evaluating MDR vendors, organizations should consider several elements, from the provider’s investigation and response capabilities to their depth of detection and beyond.
Red Canary
5 Pragmatic Tips for Preventing Ransomware

5 Pragmatic Tips for Preventing Ransomware

Available On-Demand

5 Pragmatic Tips for Preventing Ransomware

Available On-Demand
Gigamon
Quickly Respond to Attacks Across Your Network

Quickly Respond to Attacks Across Your Network

Detect and stop threats faster with FortiNDR

Quickly Respond to Attacks Across Your Network

Detect and stop threats faster with FortiNDR
Fortinet
Understanding Today's Threat Actors

Understanding Today's Threat Actors

Threats of all shapes and sizes are putting organizations everywhere at risk. As a result, traditional security controls are no longer sufficient for protecting your organization.

Understanding Today's Threat Actors

Threats of all shapes and sizes are putting organizations everywhere at risk. As a result, traditional security controls are no longer sufficient for protecting your organization.
Fortinet
Use the 2023 MITRE ATT&CK� Evaluation Results for Turla to Inform EDR Buying Decisions

Use the 2023 MITRE ATT&CK� Evaluation Results for Turla to Inform EDR Buying Decisions

Organizations need new tools to defend against today's threat landscape.

Use the 2023 MITRE ATT&CK� Evaluation Results for Turla to Inform EDR Buying Decisions

Organizations need new tools to defend against today's threat landscape.
Fortinet
Assessing Your Critical Applications' Cyber Defenses

Assessing Your Critical Applications' Cyber Defenses

Available On-Demand

Assessing Your Critical Applications' Cyber Defenses

Available On-Demand
Mandiant
Building a Modern Endpoint Strategy for 2024 and Beyond

Building a Modern Endpoint Strategy for 2024 and Beyond

Available On-Demand

Building a Modern Endpoint Strategy for 2024 and Beyond

Available On-Demand
Sophos
CNAPP for Dummies

CNAPP for Dummies

Everything you need to know to secure the changing landscape of CNAPP

CNAPP for Dummies

Everything you need to know to secure the changing landscape of CNAPP
Wiz
Empower Digital Transformation by Protecting Converged IT and OT

Empower Digital Transformation by Protecting Converged IT and OT

Security for Connected Industrial Environments

Empower Digital Transformation by Protecting Converged IT and OT

Security for Connected Industrial Environments
Fortinet
Kubernetes Security for Dummies

Kubernetes Security for Dummies

Discover new approaches to securing your containerized apps and Kubernetes clusters in this user-friendly book.

Kubernetes Security for Dummies

Discover new approaches to securing your containerized apps and Kubernetes clusters in this user-friendly book.
Wiz
Daily news, dev blogs, and stories from Game Developer straight to your inbox