Confidentiality

6 Misconceptions about Collective Defense for Cybersecurity
Collective Defense uses collaboration and threat information sharing in new and powerful ways to reduce...

NAIKON: Traces from a Military Cyber-Espionage Operation
NAIKON is a threat actor that has been active for more than a decade. The group focuses on high profile...

Navigating the Cloud: Key factors for long term success
The cloud is not only here to stay, its impact is growing. As cloud-based solutions and capabilities...

Confronting the NEW WAVE OF CYBERATTACKS
Like the virus responsible for the worldwide pandemic, email-based cyber threats continued to mutate...

Elastic Cloud Gateways: The Evolution of Secure Cloud Access
Enterprise security groups today face a daunting task. While their core responsibility of protecting...

Protect your organization from ransomware
Get a glimpse of the criminal players who operate within the underground ransomware economy. We'll help...

Ransomware The True Cost to Business
Ransomware continues to dominate the threat landscape in 2022. Organizations are under siege from a wide...

Security Operations Maturity Model
A practical guide to assessing and improving the maturity of your security operations through Threat...

Open Channels, Hidden Threats
How Communication and Social Media Tools Are Changing the Insider Risk Equation for Compliance, IT and...

High Security “to Go”
In the wake of digitalisation, the trend towards mobile work practices is also leading to profound changes....

The Definitive Guide to Data Security Posture Management (DPSM)
DSPM charts a modern path for understanding everything that affects the security posture of your data....

2021 Technology Industry Cyber Threat Landscape Report
The technology industry is a top target for both cybercriminals and state-sponsored cyber espionage groups....

Hope is NOT a strategy: Secure your business with the Content Cloud
Seems like every week there's news of another security breach. Ponemon Institute has found that the typical...
Sign up for Cyber Security Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.