{"id":1726381,"date":"2017-10-27T21:48:31","date_gmt":"2017-10-28T01:48:31","guid":{"rendered":"https:\/\/securityboulevard.com?page_id=1726381&#038;preview_id=1726381"},"modified":"2017-12-21T21:19:04","modified_gmt":"2017-12-22T02:19:04","slug":"library","status":"publish","type":"page","link":"https:\/\/securityboulevard.com\/library\/","title":{"rendered":"Boulevard Library"},"content":{"rendered":"<div id=\"pl-1726381\"  class=\"panel-layout\" ><div id=\"pg-1726381-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-1726381-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-1726381-0-0-0\" class=\"so-panel widget_text panel-first-child\" data-index=\"0\" >\t\t\t<div class=\"textwidget\"><h2 class=\"featured_title\">Featured Downloads<\/h2>\n<\/div>\n\t\t<\/div><div id=\"panel-1726381-0-0-1\" class=\"widget_text so-panel widget_custom_html\" data-index=\"1\" ><div class=\"textwidget custom-html-widget\"><div class=\"pt-cv-wrapper\"><div class=\"pt-cv-view pt-cv-scrollable pt-cv-colsys pt-cv-left\" id=\"pt-cv-view-6055f95hce\"><div data-id=\"pt-cv-page-1\" class=\"pt-cv-page\" data-cvc=\"1\"><div id=\"7c26d768xu\" class=\"pt-cv-carousel pt-cv-slide\" data-ride=\"cvcarousel\" data-interval=7000><ol class=\"pt-cv-carousel-indicators\"><li data-target=\"#7c26d768xu\" data-cvslide-to=\"0\" class=\"active\"><\/li>\n<li data-target=\"#7c26d768xu\" data-cvslide-to=\"1\" class=\"\"><\/li>\n<li data-target=\"#7c26d768xu\" data-cvslide-to=\"2\" class=\"\"><\/li>\n<li data-target=\"#7c26d768xu\" data-cvslide-to=\"3\" class=\"\"><\/li>\n<li data-target=\"#7c26d768xu\" data-cvslide-to=\"4\" class=\"\"><\/li>\n<li data-target=\"#7c26d768xu\" data-cvslide-to=\"5\" class=\"\"><\/li><\/ol>\n<div class=\"carousel-inner\"><div class=\"item active\"><div class=\"row\"><div class=\"col-md-12 col-sm-12 col-xs-6 pt-cv-content-item pt-cv-1-col\"  data-pid=\"1914804\"><a href=\"https:\/\/securityboulevard.com\/downloads\/the-preventative-developer-driven-approach-to-software-security\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvplbd\" target=\"_self\" ><img decoding=\"async\" width=\"200\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2022\/03\/cover_The-Preventative-Developer-Driven-Approach-to-Software-Security-200x260.jpg\" class=\"pt-cv-thumbnail img-shadow cvp-substitute\" alt=\"The Preventative, Developer-Driven Approach to Software Security\" title=\"\" \/><\/a>\n<div class=\"pt-cv-carousel-caption pt-cv-cap-w-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/downloads\/the-preventative-developer-driven-approach-to-software-security\/\" class=\"_self cvplbd\" target=\"_self\" >The Preventative, Developer-Driven Approach to Software Security<\/a><\/h4>\n<div class=\"pt-cv-content\">The focus on automation, tooling and reactive responses to cyber threats can no longer stand alone against an increasingly sophisticated threat landscape, where attackers are also employing advanced tools to successfully breach even the most protected networks and systems. What ... <a href=\"https:\/\/securityboulevard.com\/downloads\/the-preventative-developer-driven-approach-to-software-security\/\" class=\"_self pt-cv-readmore pt-cv-textlink cvplbd\" target=\"_self\">Read more<\/a><\/div><\/div><\/div><\/div><\/div>\n<div class=\"item\"><div class=\"row\"><div class=\"col-md-12 col-sm-12 col-xs-6 pt-cv-content-item pt-cv-1-col\"  data-pid=\"1904416\"><a href=\"https:\/\/securityboulevard.com\/downloads\/future-frontiers-why-developers-need-to-go-beyond-the-owasp-top-10-for-secure-coding-mastery\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvplbd\" target=\"_self\" ><img decoding=\"async\" width=\"200\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2021\/12\/cover_Future-Frontiers-200x260.jpeg\" class=\"pt-cv-thumbnail img-shadow cvp-substitute\" alt=\"Future Frontiers: Why Developers Need to Go Beyond the OWASP Top 10 for Secure Coding Mastery\" title=\"\" \/><\/a>\n<div class=\"pt-cv-carousel-caption pt-cv-cap-w-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/downloads\/future-frontiers-why-developers-need-to-go-beyond-the-owasp-top-10-for-secure-coding-mastery\/\" class=\"_self cvplbd\" target=\"_self\" >Future Frontiers: Why Developers Need to Go Beyond the OWASP Top 10 for Secure Coding Mastery<\/a><\/h4>\n<div class=\"pt-cv-content\">In 2021, we usher in a new era for the fabled OWASP Top 10. This latest release reveals some significant shake-ups, with Injection flaws finally being toppled from the top spot in favor of Broken Access Control vulnerabilities. Brand new ... <a href=\"https:\/\/securityboulevard.com\/downloads\/future-frontiers-why-developers-need-to-go-beyond-the-owasp-top-10-for-secure-coding-mastery\/\" class=\"_self pt-cv-readmore pt-cv-textlink cvplbd\" target=\"_self\">Read more<\/a><\/div><\/div><\/div><\/div><\/div>\n<div class=\"item\"><div class=\"row\"><div class=\"col-md-12 col-sm-12 col-xs-6 pt-cv-content-item pt-cv-1-col\"  data-pid=\"1904398\"><a href=\"https:\/\/securityboulevard.com\/downloads\/owasp-top-10-api-strategies-for-smart-developers\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvplbd\" target=\"_self\" ><img decoding=\"async\" width=\"200\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2021\/12\/cover_OWASP-Top-10-API-200x260.jpeg\" class=\"pt-cv-thumbnail img-shadow cvp-substitute\" alt=\"OWASP Top 10 API: Strategies for Smart Developers\" title=\"\" \/><\/a>\n<div class=\"pt-cv-carousel-caption pt-cv-cap-w-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/downloads\/owasp-top-10-api-strategies-for-smart-developers\/\" class=\"_self cvplbd\" target=\"_self\" >OWASP Top 10 API: Strategies for Smart Developers<\/a><\/h4>\n<div class=\"pt-cv-content\">Threats to cybersecurity these days are ubiquitous and relentless. It\u2019s become so bad that trying to keep up with them after programs are deployed has become almost impossible. However, in this age of DevSecOps, continuous delivery, and more data paydirt ... <a href=\"https:\/\/securityboulevard.com\/downloads\/owasp-top-10-api-strategies-for-smart-developers\/\" class=\"_self pt-cv-readmore pt-cv-textlink cvplbd\" target=\"_self\">Read more<\/a><\/div><\/div><\/div><\/div><\/div>\n<div class=\"item\"><div class=\"row\"><div class=\"col-md-12 col-sm-12 col-xs-6 pt-cv-content-item pt-cv-1-col\"  data-pid=\"1879497\"><a href=\"https:\/\/securityboulevard.com\/downloads\/application-security-the-best-worst-is-yet-to-come\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvplbd\" target=\"_self\" ><img decoding=\"async\" width=\"200\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2021\/04\/Cover_AppSec-200x260.jpg\" class=\"pt-cv-thumbnail img-shadow cvp-substitute\" alt=\"Application Security: The Best\/Worst Is Yet to Come\" title=\"\" \/><\/a>\n<div class=\"pt-cv-carousel-caption pt-cv-cap-w-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/downloads\/application-security-the-best-worst-is-yet-to-come\/\" class=\"_self cvplbd\" target=\"_self\" >Application Security: The Best\/Worst Is Yet to Come<\/a><\/h4>\n<div class=\"pt-cv-content\">In the wake of recent high-profile breaches, all eyes are on application security. Yet, application security hasn\u2019t always received the attention during the application development process it deserves. Many organizations deploy applications with known vulnerabilities to meet their deadlines, with ... <a href=\"https:\/\/securityboulevard.com\/downloads\/application-security-the-best-worst-is-yet-to-come\/\" class=\"_self pt-cv-readmore pt-cv-textlink cvplbd\" target=\"_self\">Read more<\/a><\/div><\/div><\/div><\/div><\/div>\n<div class=\"item\"><div class=\"row\"><div class=\"col-md-12 col-sm-12 col-xs-6 pt-cv-content-item pt-cv-1-col\"  data-pid=\"1878555\"><a href=\"https:\/\/securityboulevard.com\/downloads\/adopting-a-strategic-mindset-for-cloud-native-application-protection\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvplbd\" target=\"_self\" ><img decoding=\"async\" width=\"200\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2021\/04\/cover_Adopting-a-Strategic-Mindset-for-Cloud-Native-Application-Protection-200x260.jpg\" class=\"pt-cv-thumbnail img-shadow cvp-substitute\" alt=\"Adopting a Strategic Mindset for Cloud-Native Application Protection\" title=\"\" \/><\/a>\n<div class=\"pt-cv-carousel-caption pt-cv-cap-w-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/downloads\/adopting-a-strategic-mindset-for-cloud-native-application-protection\/\" class=\"_self cvplbd\" target=\"_self\" >Adopting a Strategic Mindset for Cloud-Native Application Protection<\/a><\/h4>\n<div class=\"pt-cv-content\">With more applications being developed in a cloud-native fashion, using containers and serverless architecture, organizations should think about smarter, more efficient and more reliable ways to protect their applications. Cyberattackers are more innovative and are achieving more success in compromising ... <a href=\"https:\/\/securityboulevard.com\/downloads\/adopting-a-strategic-mindset-for-cloud-native-application-protection\/\" class=\"_self pt-cv-readmore pt-cv-textlink cvplbd\" target=\"_self\">Read more<\/a><\/div><\/div><\/div><\/div><\/div>\n<div class=\"item\"><div class=\"row\"><div class=\"col-md-12 col-sm-12 col-xs-6 pt-cv-content-item pt-cv-1-col\"  data-pid=\"1876548\"><a href=\"https:\/\/securityboulevard.com\/downloads\/identity-the-real-key-to-security\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvplbd\" target=\"_self\" ><img decoding=\"async\" width=\"200\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2021\/03\/cover_Identity-The-Real-Key-to-Security-200x260.jpg\" class=\"pt-cv-thumbnail img-shadow cvp-substitute\" alt=\"Identity: The Real Key to Security\" title=\"\" \/><\/a>\n<div class=\"pt-cv-carousel-caption pt-cv-cap-w-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/downloads\/identity-the-real-key-to-security\/\" class=\"_self cvplbd\" target=\"_self\" >Identity: The Real Key to Security<\/a><\/h4>\n<div class=\"pt-cv-content\">Identity and access management (IAM) has long been touted as an effective way to ensure data security by providing access only to those who have the correct permissions. In today\u2019s increasingly distributed IT environment, more organizations look for zero-trust computing ... <a href=\"https:\/\/securityboulevard.com\/downloads\/identity-the-real-key-to-security\/\" class=\"_self pt-cv-readmore pt-cv-textlink cvplbd\" target=\"_self\">Read more<\/a><\/div><\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><\/div>\t\t\t<style type=\"text\/css\" id=\"pt-cv-inline-style-19b06814tx\">#pt-cv-view-6055f95hce .pt-cv-content-item { padding-left: 3px !important; }\n#pt-cv-view-6055f95hce  { margin-right: 3px !important; margin-left: 3px !important; }\n#pt-cv-view-6055f95hce .pt-cv-carousel-caption { padding-left: 3px !important; }\n#pt-cv-view-6055f95hce .pt-cv-carousel-caption { left : 3px !important }\n#pt-cv-view-6055f95hce .carousel-control.left { right : 38px }\n#pt-cv-view-6055f95hce .pt-cv-carousel-caption { right : 3px !important }\n#pt-cv-view-6055f95hce .carousel-control.right { right : 3px }\n#pt-cv-view-6055f95hce .row {margin: 0 0 !important}\n#pt-cv-view-6055f95hce .pt-cv-title a, #pt-cv-view-6055f95hce  .panel-title { font-family: 'Source Sans Pro', Arial, serif !important; font-size: 24px !important; line-height: 1.3 !important; color: #6190bb !important; }\n#pt-cv-view-6055f95hce  .pt-cv-title a:hover, #pt-cv-view-6055f95hce  .panel-title:hover   { font-family: 'Source Sans Pro', Arial, serif !important; }\n#pt-cv-view-6055f95hce .pt-cv-content , #pt-cv-view-6055f95hce  .pt-cv-content *:not(.pt-cv-readmore):not(style):not(script) { font-family: 'Source Sans Pro', Arial, serif !important; font-size: 16px !important; line-height: 1.3 !important; color: #000000 !important; }\n#pt-cv-view-6055f95hce .pt-cv-carousel-caption  { background-color: rgba(242,242,242,0.6) !important; }\n#pt-cv-view-6055f95hce .pt-cv-meta-fields .glyphicon {font-family: 'Glyphicons Halflings' !important; line-height: 1 !important;}\n#pt-cv-view-6055f95hce .pt-cv-meta-fields * { font-family: 'Roboto', Arial, serif !important; font-size: 12px !important; line-height: 1.3 !important; }\n#pt-cv-view-6055f95hce .pt-cv-custom-fields * { font-family: 'Roboto', Arial, serif !important; font-size: 12px !important; line-height: 1.3 !important; color: #000000 !important; display: block !important; text-align: left !important; clear: both !important; }\n#pt-cv-view-6055f95hce .pt-cv-readmore  { font-family: 'Roboto', Arial, serif !important; color: #6190bb !important; }\n#pt-cv-view-6055f95hce .pt-cv-readmore:hover  { font-family: 'Roboto', Arial, serif !important; color: #ffffff !important; background-color: #00aeef !important; }\n#pt-cv-view-6055f95hce  + .pt-cv-pagination-wrapper .pt-cv-more-inactive , #pt-cv-view-6055f95hce  + .pt-cv-pagination-wrapper .pagination a, .pt-cv-pagination[data-sid='6055f95hce'] a { font-family: 'Source Sans Pro', Arial, serif !important; }\n#pt-cv-view-6055f95hce { text-align: left; }<\/style>\r\n\t\t\t<link href='\/\/fonts.googleapis.com\/css?family=Source+Sans+Pro' rel='stylesheet' type='text\/css'><link href='\/\/fonts.googleapis.com\/css?family=Roboto' rel='stylesheet' type='text\/css'><\/div><\/div><div id=\"panel-1726381-0-0-2\" class=\"so-panel widget_text\" data-index=\"2\" >\t\t\t<div class=\"textwidget\"><h3>Security Boulevard Library<\/h3>\n<p>Welcome to our library of security-related resources. Here you will find whitepapers, ebooks, and more \u2013 all that will help you in your security journey. Access requires only a free registration. Search, scroll through and download what you like.<\/p>\n<\/div>\n\t\t<\/div><div id=\"panel-1726381-0-0-3\" class=\"widget_text so-panel widget_custom_html panel-last-child\" data-index=\"3\" ><div class=\"textwidget custom-html-widget\"><div class=\"pt-cv-wrapper\"><div class=\"cvp-live-filter cvp-search-box \" id=\"\" data-name=\"_search\" data-sid=\"5448f14eva\" data-isblock=\"\" data-postid=\"\"><label for='sf_1000' class=\"cvp-label\">Search<\/label><input type=\"text\" id=\"sf_1000\" name=\"_search\" value=\"\" data-nosubmit=\"true\" placeholder=\"\"\/><\/div><div class=\"cvp-live-filter cvp-dropdown \" id=\"\" data-name=\"tx_downloads_filter\" data-sid=\"5448f14eva\" data-isblock=\"\" data-postid=\"\"><label class=\"cvp-label\">By Category<\/label><select name=\"tx_downloads_filter\"><option value=\"\">All<\/option><option value=\"application-security\" >Application Security<span class=\"cvp-count\"> (26)<\/span><\/option><option value=\"ciso\" >CISO<span class=\"cvp-count\"> (4)<\/span><\/option><option value=\"cloud\" >Cloud<span class=\"cvp-count\"> (17)<\/span><\/option><option value=\"containers\" >Containers<span class=\"cvp-count\"> (8)<\/span><\/option><option value=\"devsecops\" >DevSecOps<span class=\"cvp-count\"> (33)<\/span><\/option><option value=\"fraud-detection\" >Fraud Detection<span class=\"cvp-count\"> (4)<\/span><\/option><option value=\"mobile\" >Mobile<span class=\"cvp-count\"> (1)<\/span><\/option><option value=\"open-source\" >Open source<span class=\"cvp-count\"> (4)<\/span><\/option><option value=\"threats-and-breaches\" >Threats and Breaches<span class=\"cvp-count\"> (26)<\/span><\/option><option value=\"security\" >Security<span class=\"cvp-count\"> (70)<\/span><\/option><\/select><\/div><div class=\"cvp-live-filter cvp-dropdown \" id=\"\" data-name=\"sponsor_name\" data-sid=\"5448f14eva\" data-isblock=\"\" data-postid=\"\"><label class=\"cvp-label\">By Company<\/label><select name=\"sponsor_name\"><option value=\"\">All<\/option><option value=\"Agari\" >Agari<span class=\"cvp-count\"> (1)<\/span><\/option><option value=\"Authentic8\" >Authentic8<span class=\"cvp-count\"> (3)<\/span><\/option><option value=\"CA Technologies \" >CA Technologies <span class=\"cvp-count\"> (1)<\/span><\/option><option value=\"CA Veracode\" >CA Veracode<span class=\"cvp-count\"> (1)<\/span><\/option><option value=\"Check Point Software Technologies\" >Check Point Software Technologies<span class=\"cvp-count\"> (1)<\/span><\/option><option value=\"Cisco\" >Cisco<span class=\"cvp-count\"> (1)<\/span><\/option><option value=\"CloudPassage\" >CloudPassage<span class=\"cvp-count\"> (3)<\/span><\/option><option value=\"Cobalt\" >Cobalt<span class=\"cvp-count\"> (2)<\/span><\/option><option value=\"Core Security\" >Core Security<span class=\"cvp-count\"> (3)<\/span><\/option><option value=\"DevOps.com\" >DevOps.com<span class=\"cvp-count\"> (1)<\/span><\/option><option value=\"Fortanix\" >Fortanix<span class=\"cvp-count\"> (1)<\/span><\/option><option value=\"Lacework\" >Lacework<span class=\"cvp-count\"> (3)<\/span><\/option><option value=\"ManageEngine\" >ManageEngine<span class=\"cvp-count\"> (1)<\/span><\/option><option value=\"Netenrich\" >Netenrich<span class=\"cvp-count\"> (5)<\/span><\/option><option value=\"NeuVector\" >NeuVector<span class=\"cvp-count\"> (2)<\/span><\/option><option value=\"One Identity\" >One Identity<span class=\"cvp-count\"> (2)<\/span><\/option><option value=\"OneSpan\" >OneSpan<span class=\"cvp-count\"> (1)<\/span><\/option><option value=\"Palo Alto Networks\" >Palo Alto Networks<span class=\"cvp-count\"> (5)<\/span><\/option><option value=\"PerimeterX\" >PerimeterX<span class=\"cvp-count\"> (3)<\/span><\/option><option value=\"Prisma\" >Prisma<span class=\"cvp-count\"> (2)<\/span><\/option><option value=\"Salt Security\" >Salt Security<span class=\"cvp-count\"> (1)<\/span><\/option><option value=\"Sectigo\" >Sectigo<span class=\"cvp-count\"> (2)<\/span><\/option><option value=\"Secure Code Warrior\" >Secure Code Warrior<span class=\"cvp-count\"> (3)<\/span><\/option><option value=\"SecureLink\" >SecureLink<span class=\"cvp-count\"> (1)<\/span><\/option><option value=\"Security Boulevard\" >Security Boulevard<span class=\"cvp-count\"> (22)<\/span><\/option><option value=\"Security Boulevard and CA Veracode \" >Security Boulevard and CA Veracode <span class=\"cvp-count\"> (1)<\/span><\/option><option value=\"Signal Sciences\" >Signal Sciences<span class=\"cvp-count\"> (5)<\/span><\/option><option value=\"Sonatype\" >Sonatype<span class=\"cvp-count\"> (1)<\/span><\/option><option value=\"Synack\" >Synack<span class=\"cvp-count\"> (9)<\/span><\/option><option value=\"Twistlock\" >Twistlock<span class=\"cvp-count\"> (1)<\/span><\/option><option value=\"Venafi\" >Venafi<span class=\"cvp-count\"> (1)<\/span><\/option><option value=\"Veracode\" >Veracode<span class=\"cvp-count\"> (2)<\/span><\/option><option value=\"White Hat\" >White Hat<span class=\"cvp-count\"> (1)<\/span><\/option><option value=\"WhiteHat Security\" >WhiteHat Security<span class=\"cvp-count\"> (4)<\/span><\/option><option value=\"WhiteSource\" >WhiteSource<span class=\"cvp-count\"> (11)<\/span><\/option><\/select><\/div><div class=\"pt-cv-view pt-cv-pinterest pt-cv-colsys pt-cv-shadow pt-cv-no-bb pt-cv-pgregular cvp-lfres\" id=\"pt-cv-view-5448f14eva\"><div data-id=\"pt-cv-page-1\" class=\"pt-cv-page\" data-cvc=\"1\"><div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"1914804\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/downloads\/the-preventative-developer-driven-approach-to-software-security\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-left cvplbd\" target=\"_self\" ><img decoding=\"async\" width=\"200\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2022\/03\/cover_The-Preventative-Developer-Driven-Approach-to-Software-Security-200x260.jpg\" class=\"pt-cv-thumbnail img-shadow pull-left cvp-substitute skip-lazy \" alt=\"The Preventative, Developer-Driven Approach to Software Security\" title=\"\" \/><\/a>\n<div class=\"pt-cv-colwrap\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/downloads\/the-preventative-developer-driven-approach-to-software-security\/\" class=\"_self cvplbd\" target=\"_self\" >The Preventative, Developer-Driven Approach to Software Security<\/a><\/h4><div class=\"pt-cv-content\">The focus on automation, tooling and reactive responses to cyber threats can no longer stand alone against an increasingly sophisticated threat landscape, where attackers are also employing advanced tools to successfully breach even the most protected networks and systems. What is needed is a human-led approach to software security, with ... <a href=\"https:\/\/securityboulevard.com\/downloads\/the-preventative-developer-driven-approach-to-software-security\/\" class=\"_self pt-cv-readmore pt-cv-textlink cvplbd\" target=\"_self\">Read more<\/a><\/div><div class=\"pt-cv-ctf-list\" data-cvc=\"1\"><div class=\"col-md-12 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-download_button\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/library.securityboulevard.com\/the-preventative-developer-driven-approach-to-software-security\" class=\"su-button su-button-style-default\" style=\"color:#FFFFFF;background-color:#5b7ca7;border-color:#496486;border-radius:5px\" target=\"_self\"><span style=\"color:#FFFFFF;padding:0px 16px;font-size:13px;line-height:26px;border-color:#8da4c2;border-radius:5px;text-shadow:none\"> Download Now<\/span><\/a><\/div><\/div><\/div><div class=\"col-md-12 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-sponsor_name\"><div class=\"pt-cv-ctf-value\">Secure Code Warrior<\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"1904416\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/downloads\/future-frontiers-why-developers-need-to-go-beyond-the-owasp-top-10-for-secure-coding-mastery\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-left cvplbd\" target=\"_self\" ><img decoding=\"async\" width=\"200\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2021\/12\/cover_Future-Frontiers-200x260.jpeg\" class=\"pt-cv-thumbnail img-shadow pull-left cvp-substitute skip-lazy \" alt=\"Future Frontiers: Why Developers Need to Go Beyond the OWASP Top 10 for Secure Coding Mastery\" title=\"\" \/><\/a>\n<div class=\"pt-cv-colwrap\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/downloads\/future-frontiers-why-developers-need-to-go-beyond-the-owasp-top-10-for-secure-coding-mastery\/\" class=\"_self cvplbd\" target=\"_self\" >Future Frontiers: Why Developers Need to Go Beyond the OWASP Top 10 for Secure Coding Mastery<\/a><\/h4><div class=\"pt-cv-content\">In 2021, we usher in a new era for the fabled OWASP Top 10. This latest release reveals some significant shake-ups, with Injection flaws finally being toppled from the top spot in favor of Broken Access Control vulnerabilities. Brand new entries like Insecure Design and Software and Data Integrity Failures ... <a href=\"https:\/\/securityboulevard.com\/downloads\/future-frontiers-why-developers-need-to-go-beyond-the-owasp-top-10-for-secure-coding-mastery\/\" class=\"_self pt-cv-readmore pt-cv-textlink cvplbd\" target=\"_self\">Read more<\/a><\/div><div class=\"pt-cv-ctf-list\" data-cvc=\"1\"><div class=\"col-md-12 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-download_button\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/library.securityboulevard.com\/owasp-top-10-api-strategies-for-smart-developers\" class=\"su-button su-button-style-default\" style=\"color:#FFFFFF;background-color:#5b7ca7;border-color:#496486;border-radius:5px\" target=\"_self\"><span style=\"color:#FFFFFF;padding:0px 16px;font-size:13px;line-height:26px;border-color:#8da4c2;border-radius:5px;text-shadow:none\"> Download Now<\/span><\/a><\/div><\/div><\/div><div class=\"col-md-12 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-sponsor_name\"><div class=\"pt-cv-ctf-value\">Secure Code Warrior<\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"1904398\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/downloads\/owasp-top-10-api-strategies-for-smart-developers\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-left cvplbd\" target=\"_self\" ><img decoding=\"async\" width=\"200\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2021\/12\/cover_OWASP-Top-10-API-200x260.jpeg\" class=\"pt-cv-thumbnail img-shadow pull-left cvp-substitute skip-lazy \" alt=\"OWASP Top 10 API: Strategies for Smart Developers\" title=\"\" \/><\/a>\n<div class=\"pt-cv-colwrap\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/downloads\/owasp-top-10-api-strategies-for-smart-developers\/\" class=\"_self cvplbd\" target=\"_self\" >OWASP Top 10 API: Strategies for Smart Developers<\/a><\/h4><div class=\"pt-cv-content\">Threats to cybersecurity these days are ubiquitous and relentless. It\u2019s become so bad that trying to keep up with them after programs are deployed has become almost impossible. However, in this age of DevSecOps, continuous delivery, and more data paydirt than ever before, shrewd organizations are helping developers just like ... <a href=\"https:\/\/securityboulevard.com\/downloads\/owasp-top-10-api-strategies-for-smart-developers\/\" class=\"_self pt-cv-readmore pt-cv-textlink cvplbd\" target=\"_self\">Read more<\/a><\/div><div class=\"pt-cv-ctf-list\" data-cvc=\"1\"><div class=\"col-md-12 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-download_button\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/library.securityboulevard.com\/owasp-top-10-api-strategies-for-smart-developers\" class=\"su-button su-button-style-default\" style=\"color:#FFFFFF;background-color:#5b7ca7;border-color:#496486;border-radius:5px\" target=\"_self\"><span style=\"color:#FFFFFF;padding:0px 16px;font-size:13px;line-height:26px;border-color:#8da4c2;border-radius:5px;text-shadow:none\"> Download Now<\/span><\/a><\/div><\/div><\/div><div class=\"col-md-12 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-sponsor_name\"><div class=\"pt-cv-ctf-value\">Secure Code Warrior<\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"1879497\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/downloads\/application-security-the-best-worst-is-yet-to-come\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-left cvplbd\" target=\"_self\" ><img decoding=\"async\" width=\"200\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2021\/04\/Cover_AppSec-200x260.jpg\" class=\"pt-cv-thumbnail img-shadow pull-left cvp-substitute skip-lazy \" alt=\"Application Security: The Best\/Worst Is Yet to Come\" title=\"\" \/><\/a>\n<div class=\"pt-cv-colwrap\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/downloads\/application-security-the-best-worst-is-yet-to-come\/\" class=\"_self cvplbd\" target=\"_self\" >Application Security: The Best\/Worst Is Yet to Come<\/a><\/h4><div class=\"pt-cv-content\">In the wake of recent high-profile breaches, all eyes are on application security. Yet, application security hasn\u2019t always received the attention during the application development process it deserves. Many organizations deploy applications with known vulnerabilities to meet their deadlines, with the idea that they\u2019ll be addressed in the next update ... <a href=\"https:\/\/securityboulevard.com\/downloads\/application-security-the-best-worst-is-yet-to-come\/\" class=\"_self pt-cv-readmore pt-cv-textlink cvplbd\" target=\"_self\">Read more<\/a><\/div><div class=\"pt-cv-ctf-list\" data-cvc=\"1\"><div class=\"col-md-12 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-download_button\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/library.securityboulevard.com\/application-security-the-best\/worst-is-yet-to-come\" class=\"su-button su-button-style-default\" style=\"color:#FFFFFF;background-color:#5b7ca7;border-color:#496486;border-radius:5px\" target=\"_self\"><span style=\"color:#FFFFFF;padding:0px 16px;font-size:13px;line-height:26px;border-color:#8da4c2;border-radius:5px;text-shadow:none\"> Download Now<\/span><\/a><\/div><\/div><\/div><div class=\"col-md-12 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-sponsor_name\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"1878555\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/downloads\/adopting-a-strategic-mindset-for-cloud-native-application-protection\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-left cvplbd\" target=\"_self\" ><img decoding=\"async\" width=\"200\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2021\/04\/cover_Adopting-a-Strategic-Mindset-for-Cloud-Native-Application-Protection-200x260.jpg\" class=\"pt-cv-thumbnail img-shadow pull-left cvp-substitute skip-lazy \" alt=\"Adopting a Strategic Mindset for Cloud-Native Application Protection\" title=\"\" \/><\/a>\n<div class=\"pt-cv-colwrap\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/downloads\/adopting-a-strategic-mindset-for-cloud-native-application-protection\/\" class=\"_self cvplbd\" target=\"_self\" >Adopting a Strategic Mindset for Cloud-Native Application Protection<\/a><\/h4><div class=\"pt-cv-content\">With more applications being developed in a cloud-native fashion, using containers and serverless architecture, organizations should think about smarter, more efficient and more reliable ways to protect their applications. Cyberattackers are more innovative and are achieving more success in compromising cloud-native applications, so vigilance is a must for developers, security ... <a href=\"https:\/\/securityboulevard.com\/downloads\/adopting-a-strategic-mindset-for-cloud-native-application-protection\/\" class=\"_self pt-cv-readmore pt-cv-textlink cvplbd\" target=\"_self\">Read more<\/a><\/div><div class=\"pt-cv-ctf-list\" data-cvc=\"1\"><div class=\"col-md-12 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-download_button\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/library.securityboulevard.com\/adopting-a-strategic-mindset-for-cloud-native-application-protection\" class=\"su-button su-button-style-default\" style=\"color:#FFFFFF;background-color:#5b7ca7;border-color:#496486;border-radius:5px\" target=\"_self\"><span style=\"color:#FFFFFF;padding:0px 16px;font-size:13px;line-height:26px;border-color:#8da4c2;border-radius:5px;text-shadow:none\"> Download Now<\/span><\/a><\/div><\/div><\/div><div class=\"col-md-12 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-sponsor_name\"><div class=\"pt-cv-ctf-value\">Check Point Software Technologies<\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"1876548\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/downloads\/identity-the-real-key-to-security\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-left cvplbd\" target=\"_self\" ><img decoding=\"async\" width=\"200\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2021\/03\/cover_Identity-The-Real-Key-to-Security-200x260.jpg\" class=\"pt-cv-thumbnail img-shadow pull-left cvp-substitute skip-lazy \" alt=\"Identity: The Real Key to Security\" title=\"\" \/><\/a>\n<div class=\"pt-cv-colwrap\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/downloads\/identity-the-real-key-to-security\/\" class=\"_self cvplbd\" target=\"_self\" >Identity: The Real Key to Security<\/a><\/h4><div class=\"pt-cv-content\">Identity and access management (IAM) has long been touted as an effective way to ensure data security by providing access only to those who have the correct permissions. In today\u2019s increasingly distributed IT environment, more organizations look for zero-trust computing architectures that rely on more sophisticated approaches to IAM based ... <a href=\"https:\/\/securityboulevard.com\/downloads\/identity-the-real-key-to-security\/\" class=\"_self pt-cv-readmore pt-cv-textlink cvplbd\" target=\"_self\">Read more<\/a><\/div><div class=\"pt-cv-ctf-list\" data-cvc=\"1\"><div class=\"col-md-12 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-download_button\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/library.securityboulevard.com\/identity-the-real-key-to-security\" class=\"su-button su-button-style-default\" style=\"color:#FFFFFF;background-color:#5b7ca7;border-color:#496486;border-radius:5px\" target=\"_self\"><span style=\"color:#FFFFFF;padding:0px 16px;font-size:13px;line-height:26px;border-color:#8da4c2;border-radius:5px;text-shadow:none\"> Download Now<\/span><\/a><\/div><\/div><\/div><div class=\"col-md-12 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-sponsor_name\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"1871224\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/downloads\/cybersecurity-turns-the-covid-19-corner\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-left cvplbd\" target=\"_self\" ><img decoding=\"async\" width=\"200\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2021\/02\/cover_WFH_Cybersecurity-200x260.jpg\" class=\"pt-cv-thumbnail img-shadow pull-left cvp-substitute skip-lazy \" alt=\"Cybersecurity Turns the COVID-19 Corner\" title=\"\" \/><\/a>\n<div class=\"pt-cv-colwrap\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/downloads\/cybersecurity-turns-the-covid-19-corner\/\" class=\"_self cvplbd\" target=\"_self\" >Cybersecurity Turns the COVID-19 Corner<\/a><\/h4><div class=\"pt-cv-content\">The COVID-19 pandemic has proven to be a defining moment for cybersecurity. Security perimeters crumbled overnight as entire workforces started working from home, and most gave little thought to the security implications. From a cybersecurity perspective, change reigned. In 2021, many cybersecurity teams are still working to adjust to a ... <a href=\"https:\/\/securityboulevard.com\/downloads\/cybersecurity-turns-the-covid-19-corner\/\" class=\"_self pt-cv-readmore pt-cv-textlink cvplbd\" target=\"_self\">Read more<\/a><\/div><div class=\"pt-cv-ctf-list\" data-cvc=\"1\"><div class=\"col-md-12 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-download_button\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/library.securityboulevard.com\/cybersecurity-turns-the-covid-19-corner\" class=\"su-button su-button-style-default\" style=\"color:#FFFFFF;background-color:#5b7ca7;border-color:#496486;border-radius:5px\" target=\"_self\"><span style=\"color:#FFFFFF;padding:0px 16px;font-size:13px;line-height:26px;border-color:#8da4c2;border-radius:5px;text-shadow:none\"> Download Now<\/span><\/a><\/div><\/div><\/div><div class=\"col-md-12 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-sponsor_name\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"1867149\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/downloads\/heading-off-a-cloud-security-crisis\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-left cvplbd\" target=\"_self\" ><img decoding=\"async\" width=\"200\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2020\/12\/cover_Heading-Off-a-Cloud-Security-Crisis-200x260.jpg\" class=\"pt-cv-thumbnail img-shadow pull-left cvp-substitute skip-lazy \" alt=\"Heading Off a Cloud Security Crisis\" title=\"\" \/><\/a>\n<div class=\"pt-cv-colwrap\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/downloads\/heading-off-a-cloud-security-crisis\/\" class=\"_self cvplbd\" target=\"_self\" >Heading Off a Cloud Security Crisis<\/a><\/h4><div class=\"pt-cv-content\">Application workloads deployed in the cloud, in theory at least, should be more secure than those deployed on-premises, because a cloud service provider has all the expertise required to secure those platforms. Organizations run into trouble, however, when responsibility for cloud security is shared between the cloud service provider and ... <a href=\"https:\/\/securityboulevard.com\/downloads\/heading-off-a-cloud-security-crisis\/\" class=\"_self pt-cv-readmore pt-cv-textlink cvplbd\" target=\"_self\">Read more<\/a><\/div><div class=\"pt-cv-ctf-list\" data-cvc=\"1\"><div class=\"col-md-12 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-download_button\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/library.securityboulevard.com\/heading-off-a-cloud-security-crisis\" class=\"su-button su-button-style-default\" style=\"color:#FFFFFF;background-color:#5b7ca7;border-color:#496486;border-radius:5px\" target=\"_self\"><span style=\"color:#FFFFFF;padding:0px 16px;font-size:13px;line-height:26px;border-color:#8da4c2;border-radius:5px;text-shadow:none\"> Download Now<\/span><\/a><\/div><\/div><\/div><div class=\"col-md-12 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-sponsor_name\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"1867099\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/downloads\/aws-security-case-study-visibility-into-containers-provides-application-context\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-left cvplbd\" target=\"_self\" ><img decoding=\"async\" width=\"200\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2020\/12\/cover_Poka-AWS-Security-Case-Study-200x260.jpg\" class=\"pt-cv-thumbnail img-shadow pull-left cvp-substitute skip-lazy \" alt=\"AWS Security Case Study: Visibility into Containers Provides Application Context\" title=\"\" \/><\/a>\n<div class=\"pt-cv-colwrap\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/downloads\/aws-security-case-study-visibility-into-containers-provides-application-context\/\" class=\"_self cvplbd\" target=\"_self\" >AWS Security Case Study: Visibility into Containers Provides Application Context<\/a><\/h4><div class=\"pt-cv-content\">Poka is a connected worker application built specifically for manufacturers. It brings together collaboration, training, and skills management into a single integrated platform to empower factory workers to learn continuously and solve problems autonomously. Designed from the ground-up as a cloud native application, Poka lets companies build their own proprietary ... <a href=\"https:\/\/securityboulevard.com\/downloads\/aws-security-case-study-visibility-into-containers-provides-application-context\/\" class=\"_self pt-cv-readmore pt-cv-textlink cvplbd\" target=\"_self\">Read more<\/a><\/div><div class=\"pt-cv-ctf-list\" data-cvc=\"1\"><div class=\"col-md-12 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-download_button\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/library.securityboulevard.com\/aws-security-case-study-visibility-into-containers-provides-application-context\" class=\"su-button su-button-style-default\" style=\"color:#FFFFFF;background-color:#5b7ca7;border-color:#496486;border-radius:5px\" target=\"_self\"><span style=\"color:#FFFFFF;padding:0px 16px;font-size:13px;line-height:26px;border-color:#8da4c2;border-radius:5px;text-shadow:none\"> Download Now<\/span><\/a><\/div><\/div><\/div><div class=\"col-md-12 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-sponsor_name\"><div class=\"pt-cv-ctf-value\">Lacework<\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"1864335\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/downloads\/top-ways-your-cloud-security-approach-is-burning-cash\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-left cvplbd\" target=\"_self\" ><img decoding=\"async\" width=\"200\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2020\/11\/Top-Ways-Your-Cloud-Security-Approach-is-Burning-Cash-01-200x260.png\" class=\"pt-cv-thumbnail img-shadow pull-left cvp-substitute skip-lazy \" alt=\"Top Ways Your Cloud Security Approach is Burning Cash\" title=\"\" \/><\/a>\n<div class=\"pt-cv-colwrap\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/downloads\/top-ways-your-cloud-security-approach-is-burning-cash\/\" class=\"_self cvplbd\" target=\"_self\" >Top Ways Your Cloud Security Approach is Burning Cash<\/a><\/h4><div class=\"pt-cv-content\">Through our work across hundreds\u00a0of clouds and tens of thousands of containers and workloads, we&#8217;ve captured the top ways organizations can save time and money by embracing a cloud-first approach to security. Download\u00a0this eBook to learn: Why creating suppression rules increases your breach risk, and how to move to a ... <a href=\"https:\/\/securityboulevard.com\/downloads\/top-ways-your-cloud-security-approach-is-burning-cash\/\" class=\"_self pt-cv-readmore pt-cv-textlink cvplbd\" target=\"_self\">Read more<\/a><\/div><div class=\"pt-cv-ctf-list\" data-cvc=\"1\"><div class=\"col-md-12 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-download_button\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/library.securityboulevard.com\/top-ways-your-cloud-security-approach-is-burning-cash\" class=\"su-button su-button-style-default\" style=\"color:#FFFFFF;background-color:#5b7ca7;border-color:#496486;border-radius:5px\" target=\"_self\"><span style=\"color:#FFFFFF;padding:0px 16px;font-size:13px;line-height:26px;border-color:#8da4c2;border-radius:5px;text-shadow:none\"> Download Now<\/span><\/a><\/div><\/div><\/div><div class=\"col-md-12 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-sponsor_name\"><div class=\"pt-cv-ctf-value\">Lacework<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"text-center pt-cv-pagination-wrapper\"><ul class=\"pt-cv-pagination pt-cv-ajax pagination\" data-totalpages=\"11\" data-currentpage=\"1\" data-sid=\"5448f14eva\" data-unid=\"\" data-isblock=\"\" data-postid=\"\"><li class=\"active\"><a href=\"#\">1<\/a><\/li>\n\t<li ><a class=\"\" href=\"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1726381\/?_page=2\">2<\/a><\/li>\n\t<li ><a class=\"\" href=\"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1726381\/?_page=3\">3<\/a><\/li>\n\t<li ><a href=\"#\">&hellip;<\/a><\/li>\n\t<li ><a class=\"\" href=\"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1726381\/?_page=11\">11<\/a><\/li>\n\t<li ><a class=\" \" href=\"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1726381\/?_page=2\">&rsaquo;<\/a><\/li>\n\t<\/ul><img loading=\"lazy\" decoding=\"async\" width=\"15\" height=\"15\" class=\"pt-cv-spinner\" alt=\"Loading...\" src=\"data:image\/gif;base64,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\" \/><div class=\"clear pt-cv-clear-pagination\"><\/div><\/div><\/div>\t\t\t<style type=\"text\/css\" id=\"pt-cv-inline-style-0e027731lz\">#pt-cv-view-5448f14eva .pt-cv-content-item { padding-left: 3px !important; }\n#pt-cv-view-5448f14eva  { margin-right: 3px !important; margin-left: 3px !important; }\n#pt-cv-view-5448f14eva .pt-cv-pinmas { padding-left: 3px !important; }\n#pt-cv-view-5448f14eva .pt-cv-title a, #pt-cv-view-5448f14eva  .panel-title { font-family: 'Source Sans Pro', Arial, serif !important; font-size: 20px !important; line-height: 1.3 !important; }\n#pt-cv-view-5448f14eva  .pt-cv-title a:hover, #pt-cv-view-5448f14eva  .panel-title:hover   { font-family: 'Source Sans Pro', Arial, serif !important; }\n#pt-cv-view-5448f14eva .pt-cv-content , #pt-cv-view-5448f14eva  .pt-cv-content *:not(.pt-cv-readmore):not(style):not(script) { font-family: 'Source Sans Pro', Arial, serif !important; font-size: 16px !important; line-height: 1.3 !important; }\n#pt-cv-view-5448f14eva .pt-cv-meta-fields .glyphicon {font-family: 'Glyphicons Halflings' !important; line-height: 1 !important;}\n#pt-cv-view-5448f14eva .pt-cv-meta-fields * { font-family: 'Roboto', Arial, serif !important; font-size: 12px !important; line-height: 1.3 !important; }\n#pt-cv-view-5448f14eva .pt-cv-custom-fields * { font-family: 'Source Sans Pro', Arial, serif !important; font-size: 16px !important; line-height: 1.3 !important; font-weight: 600 !important; display: block !important; text-align: left !important; clear: both !important; }\n#pt-cv-view-5448f14eva .pt-cv-readmore  { font-family: 'Roboto', Arial, serif !important; }\n#pt-cv-view-5448f14eva .pt-cv-readmore:hover  { font-family: 'Source Sans Pro', Arial, serif !important; color: #ffffff !important; background-color: #00aeef !important; }\n#pt-cv-view-5448f14eva  + .pt-cv-pagination-wrapper .pt-cv-more-inactive , #pt-cv-view-5448f14eva  + .pt-cv-pagination-wrapper .pagination a, .pt-cv-pagination[data-sid='5448f14eva'] a { font-family: 'Source Sans Pro', Arial, serif !important; }\n#pt-cv-view-5448f14eva  + .pt-cv-pagination-wrapper .pt-cv-more , #pt-cv-view-5448f14eva  + .pt-cv-pagination-wrapper .pagination .active a, .pt-cv-pagination[data-sid='5448f14eva'] .active a { font-family: 'Source Sans Pro', Arial, serif !important; color: #ffffff !important; background-color: #6190bb !important; }<\/style>\r\n\t\t\t<link href='\/\/fonts.googleapis.com\/css?family=Source+Sans+Pro' rel='stylesheet' type='text\/css'><link href='\/\/fonts.googleapis.com\/css?family=Roboto' rel='stylesheet' type='text\/css'><\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Featured Downloads Security Boulevard Library Welcome to our library of security-related resources. Here you will find whitepapers, ebooks, and more \u2013 all that will help you in your security journey. Access requires only a free registration. Search, scroll through and download what you like.<\/p>\n","protected":false},"author":6042,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-1726381","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.9 (Yoast SEO v23.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Boulevard Library - Security Boulevard<\/title>\n<meta name=\"description\" content=\"Featured Downloads Security Boulevard Library Welcome to our library of security-related resources. Here you will find whitepapers, ebooks, and more \u2013 all\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securityboulevard.com\/library\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Boulevard Library\" \/>\n<meta property=\"og:description\" content=\"Featured Downloads Security Boulevard Library Welcome to our library of security-related resources. Here you will find whitepapers, ebooks, and more \u2013 all\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securityboulevard.com\/library\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Boulevard\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/groups\/24445075146\/\" \/>\n<meta property=\"article:modified_time\" content=\"2017-12-22T02:19:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/10\/halocover-220x260.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@securityblvd\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securityboulevard.com\/library\/\",\"url\":\"https:\/\/securityboulevard.com\/library\/\",\"name\":\"Boulevard Library - Security Boulevard\",\"isPartOf\":{\"@id\":\"https:\/\/securityboulevard.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securityboulevard.com\/library\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securityboulevard.com\/library\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/10\/halocover-220x260.jpg\",\"datePublished\":\"2017-10-28T01:48:31+00:00\",\"dateModified\":\"2017-12-22T02:19:04+00:00\",\"description\":\"Featured Downloads Security Boulevard Library Welcome to our library of security-related resources. Here you will find whitepapers, ebooks, and more \u2013 all\",\"breadcrumb\":{\"@id\":\"https:\/\/securityboulevard.com\/library\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securityboulevard.com\/library\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/securityboulevard.com\/library\/#primaryimage\",\"url\":\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/10\/halocover.jpg\",\"contentUrl\":\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/10\/halocover.jpg\",\"width\":260,\"height\":336},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securityboulevard.com\/library\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securityboulevard.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Boulevard Library\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securityboulevard.com\/#website\",\"url\":\"https:\/\/securityboulevard.com\/\",\"name\":\"Security Boulevard\",\"description\":\"The Home of the Security Bloggers Network\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securityboulevard.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Boulevard Library - Security Boulevard","description":"Featured Downloads Security Boulevard Library Welcome to our library of security-related resources. Here you will find whitepapers, ebooks, and more \u2013 all","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securityboulevard.com\/library\/","og_locale":"en_US","og_type":"article","og_title":"Boulevard Library","og_description":"Featured Downloads Security Boulevard Library Welcome to our library of security-related resources. Here you will find whitepapers, ebooks, and more \u2013 all","og_url":"https:\/\/securityboulevard.com\/library\/","og_site_name":"Security Boulevard","article_publisher":"https:\/\/www.facebook.com\/groups\/24445075146\/","article_modified_time":"2017-12-22T02:19:04+00:00","og_image":[{"url":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/10\/halocover-220x260.jpg"}],"twitter_card":"summary_large_image","twitter_site":"@securityblvd","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/securityboulevard.com\/library\/","url":"https:\/\/securityboulevard.com\/library\/","name":"Boulevard Library - Security Boulevard","isPartOf":{"@id":"https:\/\/securityboulevard.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securityboulevard.com\/library\/#primaryimage"},"image":{"@id":"https:\/\/securityboulevard.com\/library\/#primaryimage"},"thumbnailUrl":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/10\/halocover-220x260.jpg","datePublished":"2017-10-28T01:48:31+00:00","dateModified":"2017-12-22T02:19:04+00:00","description":"Featured Downloads Security Boulevard Library Welcome to our library of security-related resources. Here you will find whitepapers, ebooks, and more \u2013 all","breadcrumb":{"@id":"https:\/\/securityboulevard.com\/library\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securityboulevard.com\/library\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/securityboulevard.com\/library\/#primaryimage","url":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/10\/halocover.jpg","contentUrl":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/10\/halocover.jpg","width":260,"height":336},{"@type":"BreadcrumbList","@id":"https:\/\/securityboulevard.com\/library\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securityboulevard.com\/"},{"@type":"ListItem","position":2,"name":"Boulevard Library"}]},{"@type":"WebSite","@id":"https:\/\/securityboulevard.com\/#website","url":"https:\/\/securityboulevard.com\/","name":"Security Boulevard","description":"The Home of the Security Bloggers Network","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securityboulevard.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/P91vu9-7f6R","_links":{"self":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1726381","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/users\/6042"}],"replies":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/comments?post=1726381"}],"version-history":[{"count":0,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1726381\/revisions"}],"wp:attachment":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/media?parent=1726381"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}