Resources

Cybersecurity white papers, data sheets, webinars, videos and more

Resource Library

Clear filters

Cyber Risk Compliance Reimagined: Preparing for the UK Cyber Security and Resilience Bill

December 12, 2025

Cyber Risk Compliance Reimagined: Preparing for the UK Cyber Security and Resilience Bill
A Security Assessment of Key Indian Suppliers: Third-Party Cyber Risks to Global Supply Chains

December 12, 2025

A Security Assessment of Key Indian Suppliers: Third-Party Cyber Risks to Global Supply Chains
The Silent Spies Hiding in Thousands of Devices: Operation WrtHug

December 12, 2025

The Silent Spies Hiding in Thousands of Devices: Operation WrtHug
Adversarial AI: The New Symmetric Threat Landscape

October 24, 2025

Adversarial AI: The New Symmetric Threat Landscape
From Checkbox Compliance to Active Defense: Mastering the Supply Chain Cybersecurity Maturity Curve

October 17, 2025

From Checkbox Compliance to Active Defense: Mastering the Supply Chain Cybersecurity Maturity Curve
AI-Powered Third-Party Risk Management: Go Beyond the Score

October 9, 2025

AI-Powered Third-Party Risk Management: Go Beyond the Score
DORA, NIS2 : Maîtriser les risques cyber liés aux tiers

July 17, 2025

DORA, NIS2 : Maîtriser les risques cyber liés aux tiers
DORA
NIS2
Beyond Prevention: Why Your Supply Chain Requires Real-Time Incident Response

June 10, 2025

Beyond Prevention: Why Your Supply Chain Requires Real-Time Incident Response
MAX
Threat-Informed TPRM
Fortifying Your Supply Chain: The ROI of Managed Supply Chain Detection and Response

May 21, 2025

Fortifying Your Supply Chain: The ROI of Managed Supply Chain Detection and Response
MAX
Threat-Informed TPRM
Turning Data into Action: Key Findings from the 2025 Global Third-Party Breach Report

April 29, 2025

Turning Data into Action: Key Findings from the 2025 Global Third-Party Breach Report
MAX
Threat-Informed TPRM
A CISO’s Guide to Mastering Cyber Incident Response: Are Your Vendors Your Weakest Link?

April 29, 2025

A CISO’s Guide to Mastering Cyber Incident Response: Are Your Vendors Your Weakest Link?
MAX
Threat-Informed TPRM
Navigating Supply Chain Cyber Hygiene: DORA & NIS2 in the Spotlight

March 21, 2025

Navigating Supply Chain Cyber Hygiene: DORA & NIS2 in the Spotlight
CPE | Cyber Risk Quantification: Measuring and Managing the Unseen Threats

February 28, 2025

CPE | Cyber Risk Quantification: Measuring and Managing the Unseen Threats
The Philanthropist’s Take: Bolstering Cyber Civil Defense

February 28, 2025

The Philanthropist’s Take: Bolstering Cyber Civil Defense
Navigating Systemic Risks: Strengthening Third-Party & Supply Chain Resilience

February 28, 2025

Navigating Systemic Risks: Strengthening Third-Party & Supply Chain Resilience
Breaking Silos with SCDR: How SOCs & TPRM Teams Drive Integrated Cyber Strategies

February 28, 2025

Breaking Silos with SCDR: How SOCs & TPRM Teams Drive Integrated Cyber Strategies
Threat-Informed TPRM
Strengthening Vendor Relationships and Building Cyber Resilience

February 13, 2025

Strengthening Vendor Relationships and Building Cyber Resilience
Threat-Informed TPRM
The CEO’s Take: Bridging the Cybersecurity Divide To Address Cyber Risk

January 28, 2025

The CEO’s Take: Bridging the Cybersecurity Divide To Address Cyber Risk
The CISO’s Take: Securing the Future of Financial Services & More

January 23, 2025

The CISO’s Take: Securing the Future of Financial Services & More
Cyber Santa: 2024’s Naughty List

December 16, 2024

Cyber Santa: 2024’s Naughty List