Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analytics.

Filter the library by ...

White Paper | Presented by Okta

Move Beyond Passwords

In this whitepaper, we will explore the case for going passwordless for both customer and employee authentication, and map out steps that organizations can take on their journey to true passwordless authentication.

White Paper | Presented by Veracode

Veracode Static Analysis: The Right Scan, At the Right Time, in the Right Place

Software development is integral for an organization looking to keep up with market trends, remain competitive, and disrupt markets. While the world is innovating through software, all software introduces risk. Most applications are not built with security in mind, making them a top target for security breaches. Despite years of access to security testing tools, 83 percent of applications have at least one security flaw on their initial scan, and two out of three applications fail to pass tests based on the OWASP Top 10 and SANS 25.

eGuide | Presented by Zscaler

Survivors Guide to Office 365 Networking

This survivor’s guide is a great resource to help you understand what Microsoft recommends for connectivity, and how you can build an Office 365 network that delivers a great user experience.

eBook | Presented by Panda Security

2019: A Record-Breaking Year For Ransomware

So what did ransomware in 2019 actually look like? Read on to learn about the biggest attacks of the year, how companies bounced back from them, and how you can stay protected in 2020.

White Paper | Presented by Veracode

AppSec Best Practices vs. Practicality

In this guide, we’ll look at five key AppSec best practices and discuss the practical steps you can take immediately to get the ball rolling in each of these areas.

White Paper | Presented by Panda Security

Avoiding APTs: Defending Your Critical Infrastructure

Today’s cybersecurity landscape is constantly evolving, with new attacks surfacing regularly, and known attacks growing in both scope and complexity. From ransomware to cryptojacking and beyond, hackers are continuously finding access with new tactics. One area that has seen a lot of growth recently is Advanced Persistent Threats (APTs).

COVID-19: Overcoming an Abundance of Cybersecurity Caution

This paper explores the broad sets of technology challenges we are observing today and offers potential solutions for key areas of security concern.

White Paper | Presented by Panda Security

Cyber-Security Compliance: Guide to Data Protection Regulatory Compliance

Over the last few years, new governmental, and sometimes industry-specific regulations and acts have been passed aimed at ensuring that companies and organizations store and process customers’ personal and sensitive data in an appropriate and lawful manner.

eBook | Presented by Panda Security

Danger Hiding In Plain Sight: Controlling Weaponizable Applications

In this eBook, we will cover how to identify that a non-malicious application has been weaponized, the most common methods (like PowerShell), used to carry out attacks and methods to ensure your network stays protected against these kinds of threats.

White Paper | Presented by Panda Security

No Kidnapping, No Ransom

Ransomware is still one of the most lucrative weapons in a cybercriminal’s arsenal. This kind of cybercrime encrypts the files on a computer, and blocks access to them until the required ransom is received, generally in the form of bitcoin, an untraceable virtual cryptocurrency.

Load More