
Our Latest Resources
Explore our cybersecurity white papers, data sheets, webinars, videos and more.
-
Learning Center
The 2 Types of Risk Assessment Methodology
May 12, 2025Discover how a balanced risk assessment methodology helps organizations quantify cyber risk, improve resilience, and enhance security posture.
More DetailsMiryam Meir
Tech Center -
Blog, Learning Center
What is the CIA Triad? Definition, Importance, & Examples
May 12, 2025What is the CIA Triad? Definition, Importance, & Examples to guide an organization’s security procedures and policies. Learn more below!
More DetailsTech Center -
Learning Center
How Do You Use the SIG Questionnaire for Better Third-Party Risk Assessment?
May 12, 2025Learn how to use the SIG Questionnaire to accelerate vendor risk assessments, align with compliance frameworks, and reduce third-party cyber risk.
More DetailsTech Center -
Learning Center
What Happens When HTTPS Is Misconfigured? Common Risks and How to Fix Them
May 12, 2025HTTPS misconfigurations, like expired certificates or HSTS errors, create serious security risks. Learn the most common issues and how to fix them quickly to protect your web assets.
More DetailsCybersecurity -
Learning Center
Top Free Network-Based Intrusion Detection Systems for Modern Enterprises
May 9, 2025Free and open-source network intrusion detection systems (NIDS) can enhance visibility and threat detection.
More Details -
Learning Center
How to Perform an Information Security Gap Analysis
May 8, 2025More DetailsPhoebe Fasulo
Tech Center -
Blog
What Is a Supply Chain Attack?
May 8, 2025Learn how a supply chain attack works, why it's so dangerous, and what security measures can help protect your organization from hidden threats.
More DetailsSCDR, Supply Chain Cyber Risk -
Blog
Safeguarding Against Subdomain Takeover
May 8, 2025Learn what subdomain takeover is and how to prevent it with best practices and continuous monitoring.
More Details -
Blog
Guide to Developing a Business Continuity Plan
May 8, 2025Explore business continuity in cybersecurity. Learn how a continuity plan helps assess threats, reduce risk, and protect operations from attacks.
More Details -
Learning Center
What Is PII? How to Protect Personally Identifiable Information in 2025
May 8, 2025Personally identifiable information (PII) remains a prime target for threat actors. Learn what qualifies as PII in 2025—and how to defend it.
More Details -
Learning Center
What Is a Cyber Threat? What Risk Leaders Need to Know
May 7, 2025Learn what cyber threats are, how they work, and why recognizing them is essential to reducing organizational risk.
More Details