Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analytics.

Filter the library by ...
CLEAR

White Paper | Presented by Horizon3

A Hacker’s Top 5 External Infrastructure Attack Vectors

While so many are focused on vulnerabilities and malware on endpoints, understanding the attack paths an attacker would exploit to hold your business and brand at risk is key.

White Paper | Presented by Horizon3

Compliance In Security

Focusing on compliance with standards encourages a minimal assessment behavior, validating only once or twice per year or when there is a significant, purposeful change in the environment.

Video/Webcast | Presented by Horizon3

Demystifying Ransomware

Ransomware is not new; it is an outcome. Join the conversation as this group of former nation-state-level practitioners and industry experts share their perspective and lift the veil off the mystery of ransomware.

White Paper | Presented by Mimecast

Securing the Enterprise in the Covid World – The State of Email Security

This report provides insight into the current state of email security and investigates the most pervasive types of email threats.

White Paper | Presented by Mimecast

The Year of Social Distancing – Security Challenges of the New Digital Workplace

This white paper looks at the challenges that businesses face trying to secure their new digital workplaces.

White Paper | Presented by Egress

Outbound email: Microsoft 365's security blind spot

Microsoft 365 is the world’s go-to productivity platform – but its native security technology is limited in its ability to stop outbound email data breaches.

White Paper | Presented by Egress

Outbound email: Microsoft 365's security blind spot

Microsoft 365 is the world’s go-to productivity platform – but its native security technology is limited in its ability to stop outbound email data breaches.

White Paper | Presented by Egress

Outbound email: Microsoft 365's security blind spot

Microsoft 365 is the world’s go-to productivity platform – but its native security technology is limited in its ability to stop outbound email data breaches.

Video/Webcast | Presented by Splunk

Enhance your Security Detections with Machine Learning

In this talk we will use password spraying as an example use case to showcase how detections can be matured through the use of Machine Learning.

Analyst Report | Presented by IBM

2020 KuppingerCole Leadership Compass for PAM

IBM Security Verify Privilege Vault is powered by technology from Thycotic, an IBM Partner.

Load More