Resources

Cybersecurity white papers, data sheets, webinars, videos and more

Resource Library

Clear filters

Breaches Beyond Borders: A Deep Dive Into Third-Party Cybersecurity Breaches

February 23, 2024

Breaches Beyond Borders: A Deep Dive Into Third-Party Cybersecurity Breaches
Supply Chain Cyber Risk
Cybersecurity Spending and Threat Volume: Are We Spinning Our Wheels?

February 12, 2024

Cybersecurity Spending and Threat Volume: Are We Spinning Our Wheels?
Cyber Threat Intelligence
Take Supply Chain Cyber Risk Management to the MAX

February 12, 2024

Take Supply Chain Cyber Risk Management to the MAX
Services
Supply Chain Cyber Risk
The Founders’ Take: Strategies for Cyber Resilience Despite Insecurity

February 12, 2024

The Founders’ Take: Strategies for Cyber Resilience Despite Insecurity
Executive Viewpoint
Rebuilding Trust: Introducing the Global Cyber Resilience Scorecard

January 22, 2024

Rebuilding Trust: Introducing the Global Cyber Resilience Scorecard
Cyber Threat Intelligence
Public Sector
Supply Chain Guardians: Strategies for Resilient Ecosystems

January 22, 2024

Supply Chain Guardians: Strategies for Resilient Ecosystems
Security Ratings
Supply Chain Cyber Risk
Managing Cyber Complexities in Supply Chain Risk Management

January 22, 2024

Managing Cyber Complexities in Supply Chain Risk Management
Security Ratings
Supply Chain Cyber Risk
The Fast & Frivolous: The Race for Vulnerability Remediation

January 22, 2024

The Fast & Frivolous: The Race for Vulnerability Remediation
Attack Surface Management
Quantifying Cyber Risk to Enable Business Growth

January 22, 2024

Quantifying Cyber Risk to Enable Business Growth
Cyber Insurance
Full Power of Attack Surface Data by Tying Internet Assets to Threat Context

January 22, 2024

Full Power of Attack Surface Data by Tying Internet Assets to Threat Context
Attack Surface Management
Cyber Threat Intelligence
Current Infrastructure Package and How It Impacts Cybersecurity

January 22, 2024

Current Infrastructure Package and How It Impacts Cybersecurity
Public Sector
Workshop: A Live Hunt for Malicious Activity Using Attack Surface Intelligence

January 22, 2024

Workshop: A Live Hunt for Malicious Activity Using Attack Surface Intelligence
Confident Data gives you Actionable Insights in our Q4 ’22 Release

January 22, 2024

Confident Data gives you Actionable Insights in our Q4 ’22 Release
A Deep Dive Into Cloud Security Assessments

January 22, 2024

A Deep Dive Into Cloud Security Assessments
A Deep Dive into Cyber Risk Quantification for Board Reporting

January 22, 2024

A Deep Dive into Cyber Risk Quantification for Board Reporting
Taking Control of Your Security in Turbulent Times

January 22, 2024

Taking Control of Your Security in Turbulent Times
Carve Through the Noise by Prioritizing the Most Critical Threats

January 22, 2024

Carve Through the Noise by Prioritizing the Most Critical Threats
Show the Value of Your Security Program

January 22, 2024

Show the Value of Your Security Program
Showcase your Strong Security Posture to be the Vendor of Choice

January 22, 2024

Showcase your Strong Security Posture to be the Vendor of Choice
Being Proactive with Security: Deep Dive into Tabletop Exercises

January 22, 2024

Being Proactive with Security: Deep Dive into Tabletop Exercises