Resources
Cybersecurity white papers, data sheets, webinars, videos and more
Resource Library
December 12, 2025
Cyber Risk Compliance Reimagined: Preparing for the UK Cyber Security and Resilience Bill
December 12, 2025
A Security Assessment of Key Indian Suppliers: Third-Party Cyber Risks to Global Supply Chains
December 12, 2025
The Silent Spies Hiding in Thousands of Devices: Operation WrtHug
October 24, 2025
Adversarial AI: The New Symmetric Threat Landscape
October 17, 2025
From Checkbox Compliance to Active Defense: Mastering the Supply Chain Cybersecurity Maturity Curve
October 9, 2025
AI-Powered Third-Party Risk Management: Go Beyond the Score
July 17, 2025
DORA, NIS2 : Maîtriser les risques cyber liés aux tiers
DORA
NIS2
June 10, 2025
Beyond Prevention: Why Your Supply Chain Requires Real-Time Incident Response
MAX
Threat-Informed TPRM
May 21, 2025
Fortifying Your Supply Chain: The ROI of Managed Supply Chain Detection and Response
MAX
Threat-Informed TPRM
April 29, 2025
Turning Data into Action: Key Findings from the 2025 Global Third-Party Breach Report
MAX
Threat-Informed TPRM
April 29, 2025
A CISO’s Guide to Mastering Cyber Incident Response: Are Your Vendors Your Weakest Link?
MAX
Threat-Informed TPRM
March 21, 2025
Navigating Supply Chain Cyber Hygiene: DORA & NIS2 in the Spotlight
February 28, 2025
CPE | Cyber Risk Quantification: Measuring and Managing the Unseen Threats
February 28, 2025
The Philanthropist’s Take: Bolstering Cyber Civil Defense
February 28, 2025
Navigating Systemic Risks: Strengthening Third-Party & Supply Chain Resilience
February 28, 2025
Breaking Silos with SCDR: How SOCs & TPRM Teams Drive Integrated Cyber Strategies
Threat-Informed TPRM
February 13, 2025
Strengthening Vendor Relationships and Building Cyber Resilience
Threat-Informed TPRM
January 28, 2025
The CEO’s Take: Bridging the Cybersecurity Divide To Address Cyber Risk
January 23, 2025
The CISO’s Take: Securing the Future of Financial Services & More
December 16, 2024
Cyber Santa: 2024’s Naughty List