Latest Whitepapers

Carbonite Endpoint Protection Myths
Myth: My endpoint data is secure because I have anti-virus software. Myth: Online storage is an effective...

Cybersecurity Governance for Small and Medium Businesses
Building a foundation to enable cybersecurity governance is key. The cyber threat landscape is constantly...

Six Signs Your Email Gateway Might Need Replacing
Many organisations are spending way too much money on licensing the their email SPAM and malware gateway...

An Integrated Approach to Embedding Security into DevOps
Organizations are adopting DevOps as a development and operational model to facilitate the practice of...

WatchGuard Report: State of the Art Threat Hunting in Businesses
Threat hunting is a niche function often misunderstood, that can be defined as an analyst-centric process...

An Authentication Authority at Your Fingertips: PingFederate
Having an authentication authority within your infrastructure allows you to have a single source of truth...

Strengthening Critical Infrastructure Security
Advances to critical infrastructure technology is opening the door to threat actors and cyber attacks...

The Shared Responsibility Model Explained
In a cloud environment, your service provider takes on a share of many operational burdens, including...

Active Directory Security Primer
The most important question in security is, “Is our data safe?” If you can't answer that, it's tough...

Remote Access Security checklist for every IT admin
Keep your remote workforce secure and productive. Find everything you need to ensure remote workforce...

The Future of Cybersecurity For Today’s Cloud- and Mobile-First World
Today, there's a sharp focus on embracing zero trust as the future of cybersecurity. With apps, users,...

A Visual Landscape Of Cybersecurity
Our world has never moved faster in terms of cyber threats, security technology innovations and overall...

2022 Cost of Insider Threats: Global Report
Independently conducted by Ponemon Institute External attackers aren't the only threats modern organisations...
Sign up for Cyber Security Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.