Resources

Cybersecurity white papers, data sheets, webinars, videos and more

Resource Library

Clear filters

Women in Cybersecurity Panel Event RSAC 2026 

April 2, 2026

Women in Cybersecurity Panel Event RSAC 2026 
Cyber Risk Compliance Reimagined: Preparing for the UK Cyber Security and Resilience Bill

December 12, 2025

Cyber Risk Compliance Reimagined: Preparing for the UK Cyber Security and Resilience Bill
A Security Assessment of Key Indian Suppliers: Third-Party Cyber Risks to Global Supply Chains

December 12, 2025

A Security Assessment of Key Indian Suppliers: Third-Party Cyber Risks to Global Supply Chains
The Silent Spies Hiding in Thousands of Devices: Operation WrtHug

December 12, 2025

The Silent Spies Hiding in Thousands of Devices: Operation WrtHug
Adversarial AI: The New Symmetric Threat Landscape

October 24, 2025

Adversarial AI: The New Symmetric Threat Landscape
From Checkbox Compliance to Active Defense: Mastering the Supply Chain Cybersecurity Maturity Curve

October 17, 2025

From Checkbox Compliance to Active Defense: Mastering the Supply Chain Cybersecurity Maturity Curve
AI-Powered Third-Party Risk Management: Go Beyond the Score

October 9, 2025

AI-Powered Third-Party Risk Management: Go Beyond the Score
DORA, NIS2 : Maîtriser les risques cyber liés aux tiers

July 17, 2025

DORA, NIS2 : Maîtriser les risques cyber liés aux tiers
DORA
NIS2
Beyond Prevention: Why Your Supply Chain Requires Real-Time Incident Response

June 10, 2025

Beyond Prevention: Why Your Supply Chain Requires Real-Time Incident Response
MAX
Threat-Informed TPRM
Fortifying Your Supply Chain: The ROI of Managed Supply Chain Detection and Response

May 21, 2025

Fortifying Your Supply Chain: The ROI of Managed Supply Chain Detection and Response
MAX
Threat-Informed TPRM
Turning Data into Action: Key Findings from the 2025 Global Third-Party Breach Report

April 29, 2025

Turning Data into Action: Key Findings from the 2025 Global Third-Party Breach Report
MAX
Threat-Informed TPRM
A CISO’s Guide to Mastering Cyber Incident Response: Are Your Vendors Your Weakest Link?

April 29, 2025

A CISO’s Guide to Mastering Cyber Incident Response: Are Your Vendors Your Weakest Link?
MAX
Threat-Informed TPRM
Navigating Supply Chain Cyber Hygiene: DORA & NIS2 in the Spotlight

March 21, 2025

Navigating Supply Chain Cyber Hygiene: DORA & NIS2 in the Spotlight
CPE | Cyber Risk Quantification: Measuring and Managing the Unseen Threats

February 28, 2025

CPE | Cyber Risk Quantification: Measuring and Managing the Unseen Threats
The Philanthropist’s Take: Bolstering Cyber Civil Defense

February 28, 2025

The Philanthropist’s Take: Bolstering Cyber Civil Defense
Navigating Systemic Risks: Strengthening Third-Party & Supply Chain Resilience

February 28, 2025

Navigating Systemic Risks: Strengthening Third-Party & Supply Chain Resilience
Breaking Silos with SCDR: How SOCs & TPRM Teams Drive Integrated Cyber Strategies

February 28, 2025

Breaking Silos with SCDR: How SOCs & TPRM Teams Drive Integrated Cyber Strategies
Threat-Informed TPRM
Strengthening Vendor Relationships and Building Cyber Resilience

February 13, 2025

Strengthening Vendor Relationships and Building Cyber Resilience
Threat-Informed TPRM
The CEO’s Take: Bridging the Cybersecurity Divide To Address Cyber Risk

January 28, 2025

The CEO’s Take: Bridging the Cybersecurity Divide To Address Cyber Risk
The CISO’s Take: Securing the Future of Financial Services & More

January 23, 2025

The CISO’s Take: Securing the Future of Financial Services & More
Cyber Santa: 2024’s Naughty List

December 16, 2024

Cyber Santa: 2024’s Naughty List