NEW
Webinar
Live Launch Event: New Innovations in Agentic AI.
x
NEW
Report
AI Maturity Model for Cybersecurity
x
Filters
Category
Blog
Customer Story
Webinar
Whitepapers & Datasheet
Videos
Topic
Compliance
Proactive Security
Services
AI
Identity
Endpoint
OT
Network
Cloud
Email
EMEA
Benelux
Italy
DACH
France
UK & Ireland
Asia-Pacific & Japan
Middle East & Africa
LATAM
Europe (other)
US & Canada
Micosoft
Filter by:
Tag
Blog
AI
Protecting the Experience: How a global hospitality brand stays resilient with Darktrace
Read now
Blog
Email
Darktrace Named as a Leader in 2025 Gartner® Magic Quadrant™ for Email Security Platforms
Read now
Blog
Email
From Amazon to Louis Vuitton: How Darktrace Detects Black Friday Phishing Attacks
Read now
Blog
Email
Phishing attacks surge by 620% in the lead-up to Black Friday
Read now
Blog
Network
CastleLoader & CastleRAT: Behind TAG150’s Modular Malware Delivery System
Read now
Blog
Compliance
UK Cyber Security & Resilience Bill: What Organizations Need to Know
Read now
Blog
Network
Xillen Stealer Updates to Version 5 to Evade AI Detection
Read now
Blog
OT
Managing OT Remote Access with Zero Trust Control & AI Driven Detection
Read now
Blog
Cloud
Securing Generative AI: Managing Risk in Amazon Bedrock with Darktrace / CLOUD
Read now
Blog
Network
Unmasking Vo1d: Inside Darktrace’s Botnet Detection
Read now
Blog
Network
Darktrace Named the Only 2025 Gartner® Peer Insights™ Customers’ Choice for Network Detection and Response
Read now
Blog
Network
Tracking a Dragon: Investigating a DragonForce-affiliated ransomware attack with Darktrace
Read now
Blog
Email
Why API + Journaling Delivers Faster, SLA-Backed Email Security for Microsoft 365
Read now
Blog
Network
WSUS Exploited: Darktrace’s Analysis of Post-Exploitation Activities Related to CVE-2025-59287
Read now
Blog
Proactive Security
Patch Smarter, Not Harder: Now Empowering Security Teams with Business-Aligned Threat Context Agents
Read now
Blog
Proactive Security
Darktrace Announces Extended Visibility Between Confirmed Assets and Leaked Credentials from the Deep and Dark Web
Read now
Blog
Network
Darktrace Redefines NDR: Industry-First Autonomous Threat Investigation from Network to Endpoint with Agentic AI
Read now
Blog
Salty Much: Darktrace’s view on a recent Salt Typhoon intrusion
Read now
Blog
AI
How a Major Civil Engineering Company Reduced MTTR across Network, Email and the Cloud with Darktrace
Read now
Blog
Network
Inside Akira’s SonicWall Campaign: Darktrace’s Detection and Response
Read now
Blog
OT
Redefining OT security with dedicated OT workflows & NEXT-gen visibility for industrial teams
Read now
Blog
Email
Pioneering Agentic Email Defense: Darktrace Launches in Microsoft Security Store
Read now
Blog
Email
Out of Character: Detecting Vendor Compromise and Trusted Relationship Abuse with Darktrace
Read now
Blog
AI
One-Person Security Team, Enterprise-Wide Protection: A Utility Company’s Darktrace Success Story
Read now
Blog
Cloud
Announcing Unified Real-Time CDR and Automated Investigations to Transform Cloud Security Operations
Read now
Blog
Cloud
Introducing the Industry’s First Truly Automated Cloud Forensics Solution
Read now
Blog
Network
ShadowV2: An emerging DDoS for hire botnet
Read now
Blog
Compliance
Understanding the Canadian Critical Cyber Systems Protection Act
Read now
Blog
Cloud
From the Depths: Analyzing the Cthulhu Stealer Malware for macOS
Read now
Blog
Cloud
It’s Time to Rethink Cloud Investigations
Read now
Blog
Cloud
Tracking Diicot: An Emerging Romanian Threat Actor
Read now
Blog
Cloud
Legion: An AWS Credential Harvester and SMTP Hijacker
Read now
Blog
Cloud
Updates to Legion: A Cloud Credential Harvester and SMTP Hijacker
Read now
Blog
Network
SEO Poisoning and Fake PuTTY sites: Darktrace’s Investigation into the Oyster backdoor
Read now
Blog
Cloud
From Automation to Exploitation: The Growing Misuse of Selenium Grid for Cryptomining and Proxyjacking
Read now
Blog
Network
The Benefits of Bringing Together Network and Email Security
Read now
Blog
Cloud
Forensic Victory: Catching the Ransomware EDR Couldn't See
Read now
Blog
Cloud
Unpacking the Salesloft Incident: Insights from Darktrace Observations
Read now
Blog
Cloud
Meeten Malware: A Cross-Platform Threat to Crypto Wallets on macOS and Windows
Read now
Blog
Cloud
The Nine Lives of Commando Cat: Analyzing a Novel Malware Campaign Targeting Docker
Read now
Blog
Cloud
Migo: A Redis Miner with Novel System Weakening Techniques
Read now
Blog
OT
Rethinking Signature-Based Detection for Power Utility Cybersecurity
Read now
Blog
Compliance
Cyber Assessment Framework v4.0 Raises the Bar: 6 Questions every security team should ask about their security posture
Read now
Blog
Cloud
GuLoader: Evolving Tactics in Latest Campaign Targeting European Industry
Read now
Blog
Cloud
The Growing Threat of Docusign Phishing Attacks
Read now
Blog
Cloud
Python-based Triton RAT Targeting Roblox Credentials
Read now
Blog
Cloud
Chinese APT Target Royal Thai Police in Malware Campaign
Read now
Blog
Cloud
WARPscan: Cloudflare WARP Abused to Hijack Cloud Services
Read now
Blog
Cloud
From Dormant to Dangerous: P2Pinfect Evolves to Deploy New Ransomware and Cryptominer
Read now
Blog
Cloud
Cerber Ransomware: Dissecting the three heads
Read now
Blog
Cloud
Containerised Clicks: Malicious Use of 9hits on Vulnerable Docker Hosts
Read now
Blog
Cloud
Exposed Jupyter Notebooks Targeted to Deliver Cryptominer
Read now
Blog
Cloud
Vigilance in Action: Monitoring Typosquatting Domains
Read now
Blog
Cloud
Spinning YARN: A New Linux Malware Campaign Targets Docker, Apache Hadoop, Redis and Confluence
Read now
Blog
Cloud
P2Pinfect - New Variant Targets MIPS Devices
Read now
Blog
Cloud
OracleIV: A dockerized DDoS botnet
Read now
Blog
Cloud
Qubitstrike: An Emerging Malware Campaign Targeting Jupyter Notebooks
Read now
Blog
Network
From PowerShell to Payload: Darktrace’s Detection of a Novel Cryptomining Malware
Read now
Blog
Identity
From VPS to Phishing: How Darktrace Uncovered SaaS Hijacks through Virtual Infrastructure Abuse
Read now
Blog
Network
From Exploit to Escalation: Tracking and Containing a Real-World Fortinet SSL-VPN Attack
Read now
Blog
Cloud
How Organizations are Addressing Cloud Investigation and Response
Read now
Blog
Compliance
ISO/IEC 42001: 2023: A milestone in AI standards at Darktrace
Read now
Blog
Network
Ivanti Under Siege: Investigating the Ivanti Endpoint Manager Mobile Vulnerabilities (CVE-2025-4427 & CVE-2025-4428)
Read now
Blog
Cloud
Minimizing Permissions for Cloud Forensics: A Practical Guide to Tightening Access in the Cloud
Read now
Blog
Cloud
How CDR & Automated Forensics Transform Cloud Incident Response
Read now
Blog
Network
2025 Cyber Threat Landscape: Darktrace’s Mid-Year Review
Read now
Blog
Network
Auto-Color Backdoor: How Darktrace Thwarted a Stealthy Linux Intrusion
Read now
Blog
Cloud
Closing the Cloud Forensics and Incident Response Skills Gap
Read now
Blog
AI
Darktrace's Cyber AI Analyst in Action: 4 Real-World Investigations into Advanced Threat Actors
Read now
Blog
Email
Global Telecom Provider: Powering and Protecting the World's Data Giants
Read now
Blog
Network
Untangling the web: Darktrace’s investigation of Scattered Spider’s evolving tactics
Read now
Blog
Cloud
Forensics or Fauxrensics: Five Core Capabilities for Cloud Forensics and Incident Response
Read now
Blog
Cloud
Crypto Wallets Continue to be Drained in Elaborate Social Media Scam
Read now
Blog
AI
Introducing the AI Maturity Model for Cybersecurity
Read now
Blog
Identity
Defending the Cloud: Stopping Cyber Threats in Azure and AWS with Darktrace
Read now
Blog
Identity
Top Eight Threats to SaaS Security and How to Combat Them
Read now
Blog
Proactive Security
Pre-CVE Threat Detection: 10 Examples Identifying Malicious Activity Prior to Public Disclosure of a Vulnerability
Read now
Blog
Network
Patch and Persist: Darktrace’s Detection of Blind Eagle (APT-C-36)
Read now
Blog
Email
Darktrace Collaborates with Microsoft: Unifying Email Security with a Shared Vision
Read now
Blog
Network
Tracking CVE-2025-31324: Darktrace’s detection of SAP Netweaver exploitation before and after disclosure
Read now
Blog
Network
Customer Case Study: Leading Petrochemical Manufacturer
Read now
Blog
Cloud
Breaking Silos: Why Unified Security is Critical in Hybrid World
Read now
Blog
OT
Proactive OT Security: Lessons on Supply Chain Risk Management from a Rogue Raspberry Pi
Read now
Blog
Network
Unpacking ClickFix: Darktrace’s detection of a prolific social engineering tactic
Read now
Blog
Compliance
Modernising UK Cyber Regulation: Implications of the Cyber Security and Resilience Bill
Read now
Blog
Network
Darktrace Recognized as a Leader in the 2025 Gartner® Magic Quadrant™ for Network Detection and Response
Read now
Blog
Proactive Security
Beyond Discovery: Adding Intelligent Vulnerability Validation to Darktrace / Attack Surface Management
Read now
Blog
Email
Why attack-centric approaches to email security can’t cope with modern threats
Read now
Blog
Network
PumaBot: Novel Botnet Targeting IoT Surveillance Devices
Read now
Blog
Identity
From Rockstar2FA to FlowerStorm: Investigating a Blooming Phishing-as-a-Service Platform
Read now
Blog
Network
Defending the Frontlines: Proactive Cybersecurity in Local Government
Read now
Blog
Email
Evaluating Email Security: How to Select the Best Solution for Your Organization
Read now
Blog
OT
Adapting to new USCG cybersecurity mandates: Darktrace for ports and maritime systems
Read now
Blog
Network
Catching a RAT: How Darktrace Neutralized AsyncRAT
Read now
Blog
OT
Revolutionizing OT Risk Prioritization with Darktrace 6.3
Read now
Blog
Network
Anomaly-Based Threat Hunting: Darktrace's Approach in Action
Read now
Blog
Cloud
Combatting the Top Three Sources of Risk in the Cloud
Read now
Blog
Network
SocGholish: From loader and C2 activity to RansomHub deployment
Read now
Blog
Network
Boosting Security with Azure Virtual Network TAP Traffic Mirroring
Read now
Blog
Network
Your Vendors, Your Risk: Rethinking Third-Party Security in the Age of Supply Chain Attacks
Read now
This is some text inside of a div block.
Customer Story
EVAPCO
Read now
This is some text inside of a div block.
Customer Story
Aer Soléir
Read now
This is some text inside of a div block.
Customer Story
State Government of Sinaloa
Read now
This is some text inside of a div block.
Customer Story
Papernest
Read now
This is some text inside of a div block.
Customer Story
M&S Logistics
Read now
This is some text inside of a div block.
Customer Story
Langham Logistics
Read now
This is some text inside of a div block.
Customer Story
Visit Dallas
Read now
This is some text inside of a div block.
Customer Story
Aizawa Hospital
Read now
This is some text inside of a div block.
Customer Story
Osmoflo
Read now
This is some text inside of a div block.
Customer Story
VERTO
Read now
This is some text inside of a div block.
Customer Story
PXGEO
Read now
This is some text inside of a div block.
Customer Story
Libertex Group
Read now
This is some text inside of a div block.
Customer Story
RITZ Instrument Transformers
Read now
This is some text inside of a div block.
Customer Story
DTC Communications
Read now
This is some text inside of a div block.
Customer Story
Meridian Cooperative
Read now
This is some text inside of a div block.
Customer Story
Harneys Fiduciary
Read now
This is some text inside of a div block.
Customer Story
HARMAN International
Read now
This is some text inside of a div block.
Customer Story
Everline
Read now
This is some text inside of a div block.
Customer Story
State of Oklahoma
Read now
This is some text inside of a div block.
Customer Story
Middle River Power
Read now
This is some text inside of a div block.
Customer Story
Arpa Industriale
Read now
This is some text inside of a div block.
Customer Story
Aviso
Read now
This is some text inside of a div block.
Customer Story
Bet365
Read now
This is some text inside of a div block.
Customer Story
Heartland Communications Facility Authority
Read now
This is some text inside of a div block.
Customer Story
Bristows
Read now
This is some text inside of a div block.
Customer Story
Capital Brands Holdings
Read now
This is some text inside of a div block.
Customer Story
Bassadone Automotive Group
Read now
This is some text inside of a div block.
Customer Story
Kit Carson
Read now
This is some text inside of a div block.
Customer Story
SMSA Express
Read now
This is some text inside of a div block.
Customer Story
Centre Parcs
Read now
This is some text inside of a div block.
Customer Story
South Coast Water District
Read now
This is some text inside of a div block.
Customer Story
Brisbane Airport Corporation
Read now
This is some text inside of a div block.
Customer Story
Hauraki District Council
Read now
This is some text inside of a div block.
Customer Story
The Colombian National Army
Read now
This is some text inside of a div block.
Customer Story
Museum of Flight
Read now
This is some text inside of a div block.
Customer Story
D24
Read now
This is some text inside of a div block.
Customer Story
Addison Group
Read now
This is some text inside of a div block.
Customer Story
DigiMax
Read now
This is some text inside of a div block.
Customer Story
ONNERA Group
Read now
This is some text inside of a div block.
Customer Story
Slovenia Control
Read now
This is some text inside of a div block.
Customer Story
GCP Hospitality
Read now
This is some text inside of a div block.
Customer Story
Community Housing Limited
Read now
This is some text inside of a div block.
Customer Story
Abdullah Al Othaim Investment
Read now
This is some text inside of a div block.
Customer Story
Royal Caribbean
Read now
This is some text inside of a div block.
Customer Story
Australian Grand Prix
Read now
This is some text inside of a div block.
Customer Story
OneWeb
Read now
This is some text inside of a div block.
Customer Story
The Royal Mint
Read now
This is some text inside of a div block.
Customer Story
Qatar World Cup 2022
Read now
This is some text inside of a div block.
Customer Story
Telenor IoT
Read now
This is some text inside of a div block.
Customer Story
Dreamworld
Read now
This is some text inside of a div block.
Customer Story
Masonicare
Read now
This is some text inside of a div block.
Customer Story
RioCan
Read now
This is some text inside of a div block.
Customer Story
Primaflor
Read now
This is some text inside of a div block.
Customer Story
Direct Federal Credit Union
Read now
This is some text inside of a div block.
Customer Story
Vixxo
Read now
This is some text inside of a div block.
Customer Story
Ongweoweh
Read now
This is some text inside of a div block.
Customer Story
American Kidney Fund
Read now
This is some text inside of a div block.
Customer Story
Blue Bird Group
Read now
This is some text inside of a div block.
Customer Story
Sir Robert McAlpine
Read now
This is some text inside of a div block.
Customer Story
Duferco
Read now
This is some text inside of a div block.
Customer Story
KTR Systems
Read now
This is some text inside of a div block.
Customer Story
City of Tyler
Read now
This is some text inside of a div block.
Customer Story
NKGSB Bank
Read now
This is some text inside of a div block.
Customer Story
Calligo
Read now
This is some text inside of a div block.
Customer Story
Funding Circle
Read now
This is some text inside of a div block.
Customer Story
Boardriders
Read now
This is some text inside of a div block.
Customer Story
Mainstream Renewable Power
Read now
This is some text inside of a div block.
Customer Story
Guardsman Group
Read now
This is some text inside of a div block.
Customer Story
Scope Markets
Read now
This is some text inside of a div block.
Customer Story
City of College Station Utilities
Read now
This is some text inside of a div block.
Customer Story
Vermaat
Read now
This is some text inside of a div block.
Customer Story
EV Group
Read now
This is some text inside of a div block.
Customer Story
CordenPharma
Read now
This is some text inside of a div block.
Customer Story
City of Las Vegas
Read now
This is some text inside of a div block.
Customer Story
Sanabel Al-Salam
Read now
This is some text inside of a div block.
Customer Story
Bank One
Read now
This is some text inside of a div block.
Customer Story
AAA Washington
Read now
This is some text inside of a div block.
Customer Story
Pittsburgh Cultural Trust
Read now
This is some text inside of a div block.
Customer Story
Confiar
Read now
This is some text inside of a div block.
Customer Story
Sefalana Group
Read now
This is some text inside of a div block.
Customer Story
Lighthouse Global
Read now
This is some text inside of a div block.
Customer Story
Breitenfeld
Read now
This is some text inside of a div block.
Customer Story
Louisiana State University of Alexandria
Read now
This is some text inside of a div block.
Customer Story
National Institute of Aerospace Technology
Read now
This is some text inside of a div block.
Customer Story
Saniflo
Read now
This is some text inside of a div block.
Customer Story
Milton Keynes University Hospital
Read now
This is some text inside of a div block.
Customer Story
McLaren
Read now
This is some text inside of a div block.
Customer Story
Drax Group
Read now
This is some text inside of a div block.
Customer Story
Terra Mauricia
Read now
Webinar
Live
On-demand
Secure AI Adoption without Compromise | APJ
Register now
watch now
Webinar
Live
On-demand
Secure AI Adoption without Compromise | EMEA
Register now
watch now
Webinar
Live
On-demand
Secure AI Adoption without Compromise | AMS
Register now
watch now
Webinar
Live
On-demand
Building a Smarter Ecosystem: Inside the Latest Innovations from Darktrace and Microsoft
Register now
watch now
Webinar
Live
On-demand
Announcing New Innovations in Agentic AI Enabling Cross-Domain Detection & Response | APJ
Register now
watch now
Webinar
Live
On-demand
Announcing New Innovations in Agentic AI Enabling Cross-Domain Detection & Response | AMS
Register now
watch now
Webinar
Live
On-demand
Announcing New Innovations in Agentic AI Enabling Cross-Domain Detection & Response | EMEA
Register now
watch now
Webinar
Live
On-demand
Darktrace Tech Meetup, EMEA
Register now
watch now
Webinar
Live
On-demand
Come Trasformare la Sicurezza della Rete in uno Stato Proattivo di Resilienza
Register now
watch now
Webinar
Live
On-demand
Sicher durch die Feiertage: So gelingt der Wandel zur proaktiven Netzwerksicherheit
Register now
watch now
Webinar
Live
On-demand
Evolution der Sicherheitsstrukturen im KI-Zeitalter
Register now
watch now
Webinar
Live
On-demand
Effizienzsteigerung im SOC durch Agentische KI
Register now
watch now
Webinar
Live
On-demand
Effektiver Schutz durch selbstlernende KI: Der Darktrace-Ansatz im Detail
Register now
watch now
Webinar
Live
On-demand
Securing Multi-Cloud Environments
Register now
watch now
Webinar
Live
On-demand
Transforming SOC Operations with AI: From Alert Fatigue to Proactive Defense
Register now
watch now
Webinar
Live
On-demand
AI-Driven Security for People: Protecting Identities Across the Attack Lifecycle
Register now
watch now
Webinar
Live
On-demand
Navigating the AI Cybersecurity Landscape of 2025: Predictions and Preparations
Register now
watch now
Webinar
Live
On-demand
Unleashing the Power of Microsoft and Darktrace
Register now
watch now
Webinar
Live
On-demand
Announcing the Industry’s First Truly Automated Cloud Forensics Solution | APJ
Register now
watch now
Webinar
Live
On-demand
Announcing the Industry’s First Truly Automated Cloud Forensics Solution | EMEA
Register now
watch now
Webinar
Live
On-demand
Announcing the Industry’s First Truly Automated Cloud Forensics Solution | AMS
Register now
watch now
Webinar
Live
On-demand
Evolution of the Security Organization in the Era of AI
Register now
watch now
Webinar
Live
On-demand
Force Multiply Your Security Team with Agentic AI
Register now
watch now
Webinar
Live
On-demand
Inside Darktrace Self-Learning AI: What Makes It Different
Register now
watch now
Webinar
Live
On-demand
/connectOT: AI Meets Compliance - How Darktrace Powers CIP-015-1 Readiness with WWT
Register now
watch now
Webinar
Live
On-demand
The Reality of OT Visibility and How to Fast-Track Security Monitoring in Industrial Networks
Register now
watch now
Webinar
Live
On-demand
Hoe AI OT-beveiligingsteams in de Benelux helpt om volledige zichtbaarheid en SOC-weerbaarheid te realiseren
Register now
watch now
Webinar
Live
On-demand
Outsmart Adversaries with Real AI Cyber Defense
Register now
watch now
Webinar
Live
On-demand
How AI Helps OT Security Teams in the Nordics Gain Full Visibility & SOC Resilience
Register now
watch now
Webinar
Live
On-demand
Evolution of the Security Organization in the Era of AI
Register now
watch now
Webinar
Live
On-demand
L'art de repérer les emails malveillants : Darktrace / EMAIL contre les attaques sophistiquées
Register now
watch now
Webinar
Live
On-demand
Force Multiply Your Security Team with Agentic AI
Register now
watch now
Webinar
Live
On-demand
Inside Darktrace Self-Learning AI: What Makes It Different – and More Effective
Register now
watch now
Webinar
Live
On-demand
Exploring Today’s Communication Threat Landscape
Register now
watch now
Webinar
Live
On-demand
ConnectMW: Incident Readiness and Recovery (IRR)
Register now
watch now
Webinar
Live
On-demand
AI-Driven Security for People: Preventing BEC Across the Attack Lifecycle
Register now
watch now
Webinar
Live
On-demand
Darktrace & Microsoft Securing the Education Sector and Beyond with AI
Register now
watch now
Webinar
Live
On-demand
How AI Helps OT Security Teams Gain Full Visibility & SOC Resilience
Register now
watch now
Webinar
Live
On-demand
How Defenders Can Use AI to Mitigate Cyber Risk in the Cloud with AWS and Softchoice
Register now
watch now
Webinar
Live
On-demand
Die Lage der IT-Sicherheit 2024/25: Der BSI-Bericht im Fokus
Register now
watch now
Webinar
Live
On-demand
Explorando la ciberseguridad en 2025: Predicciones y estrategias
Register now
watch now
Webinar
Live
On-demand
Naviguer la cybersécurité en 2025 : Prédictions et préparations
Register now
watch now
Webinar
Live
On-demand
How to Shift Your Network Security to a Proactive State of Resilience
Register now
watch now
Webinar
Live
On-demand
Navigating the AI Cybersecurity Landscape of 2025: Predictions and Preparations
Register now
watch now
Webinar
Live
On-demand
AI-Driven Security for People: Protecting Identities Across the Attack Lifecycle
Register now
watch now
Webinar
Live
On-demand
Virtual Fireside Chat: Unleashing the Power of Microsoft and Darktrace
Register now
watch now
AI
Whitepapers & Datasheet
APJ Threat Landscape: Patterns, Actors and Emerging Risks
Download now
Compliance
Whitepapers & Datasheet
Compliance Mapping: Darktrace & CAF v4.0
Download now
Endpoint
Whitepapers & Datasheet
From EDR Reliance to Resilience: Closing the Gap Between Networks and Endpoints
Download now
Network
Whitepapers & Datasheet
Buyer's Checklist for Evaluating NDR Solutions
Download now
Cloud
Whitepapers & Datasheet
Automated Cloud Forensics Explained
Download now
Incident Response
Whitepapers & Datasheet
The Ultimate Guide to Automating Incident Response
Download now
Incident Response
Whitepapers & Datasheet
Securing and Investigating Containerized Applications Running on AWS ECS
Download now
Incident Response
Whitepapers & Datasheet
Building an Incident Response Plan for Healthcare
Download now
Incident Response
Whitepapers & Datasheet
Building an Incident Response Plan for Financial Services
Download now
Cloud
Whitepapers & Datasheet
2024 Cloud Forensics Threat Report
Download now
Network
Whitepapers & Datasheet
The State of Cybersecurity in the Global Telecommunications Sector
Download now
Network
Whitepapers & Datasheet
Why Your NDR and Email Security Solutions Need to Work Together
Download now
Cloud
Whitepapers & Datasheet
Ultimate Guide to Incident Response in AWS
Download now
Cloud
Whitepapers & Datasheet
Ultimate Guide to Incident Response in Azure
Download now
Cloud
Whitepapers & Datasheet
Ultimate Guide to Incident Response in Google Cloud Platform
Download now
AI
Whitepapers & Datasheet
The AI Maturity Model for Cybersecurity
Download now
Cloud
Whitepapers & Datasheet
From Detection to Resolution: Enhancing CDR with Advanced Forensics
Download now
Cloud
Whitepapers & Datasheet
Five Core Capabilities for Cloud Forensics and Incident Response
Download now
Compliance
Whitepapers & Datasheet
Mapping Compliance to Capability: IEC 62443 & Darktrace / OT
Download now
Identity
Whitepapers & Datasheet
Beyond Boundaries: Fortifying Identity Security in the Cloud Era
Download now
Email
Whitepapers & Datasheet
A Buyer’s Checklist for Evaluating Email Security
Download now
Email
Whitepapers & Datasheet
Replacing Your SEG: A Step-by-Step Guide for CISOs
Download now
AI
Whitepapers & Datasheet
The State of Cybersecurity in the UK, US and Brazil Healthcare Sectors
Download now
AI
Whitepapers & Datasheet
AI & Cybersecurity: The state of cyber in UK and US energy sectors
Download now
Email
Whitepapers & Datasheet
Multi-Layered Email Security for Microsoft: A Guide to Ending Business Email Compromise
Download now
AI
Whitepapers & Datasheet
Towards Responsible AI in Cybersecurity
Download now
Compliance
Whitepapers & Datasheet
The Boardroom Companion for Decoding DORA
Download now
AI
Whitepapers & Datasheet
The State of AI Cybersecurity 2025
Download now
Network
Whitepapers & Datasheet
Annual Threat Report 2024
Download now
AI
Whitepapers & Datasheet
The AI Arsenal: Understanding the Tools Shaping Cybersecurity
Download now
Cloud
Whitepapers & Datasheet
Tackling the 11 Biggest Cloud Threats with AI-Powered Defense
Download now
Network
Whitepapers & Datasheet
A Buyer’s Guide to Network Security Solutions
Download now
Compliance
Whitepapers & Datasheet
Darktrace Framework Mapping: G3 IT Security Guidelines
Download now
Compliance
Whitepapers & Datasheet
Darktrace framework mapping: NCA Essential Cyber Security Controls
Download now
Incident Response
Whitepapers & Datasheet
The CISO’s Guide to Incident Management
Download now
Whitepapers & Datasheet
Reducing Cyber Risk: A Guide to Proactive IT Security for Modern Networks
Download now
AI
Whitepapers & Datasheet
The CISO's Guide to Buying AI
Download now
AI
Whitepapers & Datasheet
The CISO's Guide to Navigating the Cybersecurity Skills Shortage
Download now
Email
Whitepapers & Datasheet
Beyond the Inbox: A Guide to Preventing Business Email Compromise
Download now
OT
Whitepapers & Datasheet
Navigating the Complexities of OT & ICS Cyber Risk Management
Download now
Network
Whitepapers & Datasheet
First 6: Half-Year Threat Report 2024
Download now
AI
Whitepapers & Datasheet
State of Cybersecurity AI - Netherlands Edition
Download now
AI
Whitepapers & Datasheet
State of Cybersecurity AI - UK Edition
Download now
AI
Whitepapers & Datasheet
State of Cybersecurity AI - Australia Edition
Download now
Email
Whitepapers & Datasheet
How AI is Changing the Phishing Landscape
Download now
Whitepapers & Datasheet
State of AI Cyber Security 2024
Download now
Network
Whitepapers & Datasheet
Preventing the Top 4 Supply Chain Risks
Download now
Cloud
Whitepapers & Datasheet
CISO Stories: Cloud Security
Download now
AI
Whitepapers & Datasheet
CISO Stories: The AI Arms Race
Download now
Network
Whitepapers & Datasheet
End of Year Threat Report
Download now
AI
Whitepapers & Datasheet
AI with Humans in Mind
Download now
AI
Whitepapers & Datasheet
Best Security Practices for Implementing AI in the Enterprise
Download now
Compliance
Whitepapers & Datasheet
7 Steps to Get Ahead with NIS2
Download now
Identity
Whitepapers & Datasheet
A Guide to Implementing and Enforcing Zero Trust
Download now
Network
Whitepapers & Datasheet
Six Challenges to Securing the Modern Network
Download now
Compliance
Whitepapers & Datasheet
Darktrace HEAL Framework Mapping: ISO/IEC 27002 (5.24-5.29)
Download now
Network
Whitepapers & Datasheet
Why Point Solutions Fail: Best Practices for Consolidating Security Tools
Download now
Whitepapers & Datasheet
Darktrace Technical Assessment by TAC
Download now
OT
Whitepapers & Datasheet
OT Security Guide: Strategies & Case Studies
Download now
Cloud
Whitepapers & Datasheet
The CISO's Guide to Cloud Security
Download now
Whitepapers & Datasheet
First 6: Half-Year Threat Report
Download now
AI
Whitepapers & Datasheet
The CISO's Guide to Cyber AI: Categorizing the Use of AI in Cyber Security
Download now
Whitepapers & Datasheet
Navigating a New Threat Landscape: Breaking Down the AI Kill Chain
Download now
Whitepapers & Datasheet
Managing Cyber Risk: An APAC Threat Report
Download now
Compliance
Whitepapers & Datasheet
Darktrace Framework Mapping: NIST-CSF
Download now
Compliance
Whitepapers & Datasheet
IT Cybersecurity Act 2.0
Download now
Compliance
Whitepapers & Datasheet
Darktrace Framework Mapping: NIST SP800-160 Vol 2
Download now
Compliance
Whitepapers & Datasheet
General Data Protection Regulation (GDPR)
Download now
Compliance
Whitepapers & Datasheet
EPA Cyber Security Checklist for Public Water Systems
Download now
Email
Whitepapers & Datasheet
CISO's Guide to Email Security: Protection & Threats
Download now
Whitepapers & Datasheet
TSA Cyber Security Requirements for Aviation
Download now
Whitepapers & Datasheet
Detection and Response Across the Enterprise
Download now
Whitepapers & Datasheet
Reducing Cyber Risk: A Guide to Preventative IT Security
Download now
Whitepapers & Datasheet
Building a Case for a Virtuous Cycle in Cybersecurity
Download now
Compliance
Whitepapers & Datasheet
Darktrace: Mapping to MITRE
Download now
Identity
Whitepapers & Datasheet
Self-Learning AI for Zero Trust Environments
Download now
AI
Whitepapers & Datasheet
Managing AI Decision-Making in Cyber Security
Download now
Whitepapers & Datasheet
Threat Landscape Series: Neutralizing Ransomware
Download now
Whitepapers & Datasheet
Autonomous Response: Streamlining Cybersecurity and Business Operations
Download now
Cloud
Whitepapers & Datasheet
Self-Learning Cloud Security
Download now
Identity
Whitepapers & Datasheet
Protecting your SaaS: A Guide to Cloud Application Security
Download now
OT
Whitepapers & Datasheet
How Darktrace Can Complement Industrial OEMs
Download now
OT
Whitepapers & Datasheet
Defending Critical Infrastructure Against Ransomware
Download now
Cloud
Videos
Darktrace / CLOUD Demo: Stopping Exfiltration in the Cloud
Watch now
Incident Response
Videos
Demo of Darktrace / Forensic Acquisition & Investigation: Container Investigations
Watch now
Incident Response
Videos
Demo of Darktrace / Forensic Acquisition & Investigation: Cloud Investigations
Watch now
Incident Response
Videos
Demo of Darktrace / Forensic Acquisition & Investigation: SOC Triage
Watch now
Cloud
Videos
Demo of Darktrace / Forensic Acquisition & Investigation: Cloud Detection & Response
Watch now
Network
Videos
Stopping Fog Ransomware Early with AI Network Security Tools
Watch now
Cloud
Videos
Webinar: Securing Multi-Cloud Environments
Watch now
Services
Videos
Darktrace Solutions for BEC Attack Defense
Watch now
Videos
Microsoft UK Partner of the Year 2024
Watch now
Email
Videos
Catching Dropbox Phishing Email Scams
Watch now
AI
Videos
Microsoft AI Showcase with Mike Beck
Watch now
AI
Videos
Microsoft’s Ann Johnson on Cyber Defense
Watch now
Network
Videos
Combatting Smokeloader Malware Effectively
Watch now
Videos
Darktrace Virtual Innovation Launch
Watch now
Network
Videos
How to Identify Ivanti Vulnerabilities
Watch now
Network
Videos
Gootloader Malware Protection Tips
Watch now
Identity
Videos
Protect Your Dropbox from Account Takeovers
Watch now
Videos
Understanding AI in Cyber Security
Watch now
Identity
Videos
Stopping a Zoom Spoofing Attack
Watch now
Email
Videos
Defending Against QR Code Scams
Watch now
Videos
Subdomain Takeover Prevention Tips
Watch now
Videos
Identifying Account Takeovers
Watch now
Videos
Combatting HR Impersonation Fraud
Watch now
Videos
Threat Analysis Stories: Detecting a College Scam that Attempted Cyber Financial Aid Fraud
Watch now
Cloud
Videos
Protect Your Cloud with Darktrace
Watch now
Videos
How Vixxo uses Darktrace AI to Protect the Business
Watch now
Identity
Videos
Cybersecurity for the Modern Worker
Watch now
Videos
Drax
Watch now
Videos
Meet the Cyber AI Analyst
Watch now
Videos
Cloud Security: Defending McLaren with AI
Watch now
Videos
Attack Path Modeling Explained
Watch now
Videos
Ted Baker Case Study
Watch now
Videos
Drax Case Study
Watch now
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Get a demo