Whitepaper archive
Filter (27 articles)
Go
- April 28th
- Stay Ahead of AI-Powered Phishing Attacks: What You Need to Know!
- New Authentication Standards in Email Communication
- Collaborative Tools and Data Breaches: Is There a "Copilot" on the Plane?
- 5 Steps to Prioritize Based on Risk with Snyk
- Beyond the Vulnerability Backlog: Building Risk-Based AppSec Programs
- Optimizing appsec in the technology sector
- Gartner Top Strategic Technology Trends for 2025: Agentic AI
- Why the Fastest Technology Companies choose Snyk Cheat Sheet
- 6 steps to a stronger security posture through automation
- Empowered Intelligence: The Impact of AI Agents
- April 17th
- The Race Is On for Higher Ed to Adapt: Equity in Hyflex Learning
- Solution Brief: Find Known and Unknown Threats Faster
- AWS eBook: Evolve Your Cloud Security on AWS
- eBook: Dummies for CNAPP
- Case Study: HealthVerity Cures Critical Alerts with Clear Diagnosis
- Modernize Active Directory: Break Free from the Limitations of AD
- IT & Security: The Critical Alliance Against Cyber Threats
- Device Management Is a Losing Battle
- Stronger Together: Why IT-Security Collaboration Drives Greater Security and Efficiency
- Simplifying Password Management eBook
- Living off the Land eBook
- April 16th
- The Public Sector's Guide to Privilege and Password Management
- The UAC Conundrum: How to Manage Admin Privileges Without Frustrating Users
- Zero Standing Privilege: Automating Cybersecurity Without Disrupting Productivity
- Reinventing Procurement: From Cost Center to Innovation Driver
- Digital Optimisation Paves the Way to Strategic Supplier Management
- 2024 State of Procurement Report
-
2025
-
2024
-
2023
-
2022
-
2021
-
2020
-
2019