Skip to main content

Cybersecurity Resources

Latest thinking and useful insights on the changing landscape of cybersecurity.

Webinars

Preventing wireless attacks with device visibility and effective controls

We discuss the results from our recent wireless research and offer specific guidance on how to implement greater security controls to improve device visibility

Webinars

Risk based vulnerability management: What's in a risk score?

We identify the benefits of a risk-based approach, highlighting how this can make vulnerabilities more manageable and streamlining remediation through automation and orchestration

Webinars

Cloud security controls best practice

How best to manage between them with Gartner’s CWPP and CSPM models, combined with practical advice on how security professionals can utilize CIS benchmarking to analyze gaps in AWS, Azure and GCP more effectively. 

Webinars

Mastering the art of multicloud security

We discuss the challenges and pitfalls you might face throughout the cloud migration journey, and show you how our cloud security tools help to mitigate the risk of data leak from ‘shift and lift’ to ‘cloud native’ from top to bottom.

Webinars

Why asset discovery is the missing link to your enterprise vulnerability management

Learn how an asynchronous approach can help build an enterprise CMDB and automate continuous detection for any new and critical vulnerabilities in your asset repository so you’ll never miss a critical risk again

Webinars

Understanding the 7 deadly web application attack vectors

We explain how to accurately identify the risk levels of your web application

Webinars

Protecting Cezanne HR’s cloud web application with continuous assessment

We discuss the importance of data protection in HR, and how a hybrid continuous assessment approach has helped secure their business critical apps and maintain ISO certification standards at scale

Webinars

Mastering container security in modern day DevOps

We examine the security challenges that come with container adoption and unpack the key steps required to integrate and automate container assessment into the DevOps cycle

Whitepapers

Web Application Security for Insurance 2021

Attack Surface Analysis and Benchmark Study for Europe’s Top Insurance Companies

Looking for anything in particular?

Type your search word here