REGISTER

Information Security

lansweeper pdf Download (1.70 MB)

Lansweeper's best-in-class IT Asset Discovery technology can help you check all these boxes.

lansweeper pdf Download (429 KB)

Use this checklist to ensure you have the right technologies, tools and processes in place to reduce the risk of vulnerabilities in your technology estate and enhance your abilities.

ss pdf Download (627 KB)

With the SimSpace Cyber Force Platform, CISOs and their teams can put their tools and processes to the test, continually improve organizational security posture, demonstrate compliance and ensure a seamless customer experience.

d pdf Download (1.31 MB)

The importance of reputation and resilience in cybersecurity

netwrixtn pdf Download (565 KB)

This guide will help the reader to understand:

terranova pdf Download (2.48 MB)

This book will help executives and managers as well as all individuals to understand how to practically make each individual a first line of defense.

d pdf Download (1.01 MB)

A board reporting checklist for CISOs

ot pdf Download (959 KB)

Let’s face it, ISO 27001 isn’t the world’s most exhilarating topic. But that’s not why you’re here. Chances are, your company’s thinking about certification and you’ll be a key stakeholder for the project. Naturally, you want to know what ISO 27001 is all about. More than that, you want to set your team up for a successful audit.

CCTNacl pdf Download (2.50 MB)

Building cyber resilience for resource-constrained teams

netwrixtn pdf Download (315 KB)

Rampant cybersecurity breaches continue to threaten all business types. Attacks continue to rise 50% year over year, with 61% of SMBs reporting at least one cyberattack in 2021.

ss pdf Download (511 KB)

On March 15, 2022, the Cybersecurity Incident Reporting for Critical Infrastructures Act of 2022 was signed into law.

ss pdf Download (802 KB)

Transform your cybersecurity strategy from reactive to proactive with the Comprehensive Guide to Cyber Ranges. Learn how high-fidelity simulated environments empower security professionals to train, test, and respond effectively to evolving threats.

dl pdf Download (4.54 MB)

Learn how to secure your Windows endpoints against cyberattacks by adopting the mindset of a cyber criminal. Discover the vulnerabilities that malicious hackers target and explore the tools and techniques ethical hackers use to better protect IT environments and sensitive information.

Log in Register

Please Login to download this file

Username *
Password *
Remember Me
Go to top