Latest Whitepapers

5 Tips for Managing Third-Party Risk
Across industries and around the world, executives remain preoccupied with digital transformation. According...

CyberArk 2022 Identity Security Threat Landscape Report
A global report from CyberArk which shows that 79% of senior security professionals say that cybersecurity...

The Top 10 Biggest and Boldest Insider Threats
Over the last two years alone, insider security incidents have jumped 47%, with the average cost per...

CRM Evolved Introducing the Era of Intelligent Engagement
Digital Transformation, a key focus of successful organizations, proves itself a business imperative,...

Brute Force: Guide to Mitigating Attacks
A brute force attack is when an attacker attempts to gain access to an environment by identifying valid...

Edging Towards SASE: Next generation networking, cloud and security
The global pandemic has delivered a paradigm shift in the relationship between employees and their workplace....

Ransomware The True Cost to Business
Ransomware continues to dominate the threat landscape in 2022. Organizations are under siege from a wide...

Public Sector Cloud Journey
As the government continues to move workloads to the cloud, many agencies are struggling to automate...

Cybersecurity Governance for Small and Medium Businesses
Building a foundation to enable cybersecurity governance is key. The cyber threat landscape is constantly...

Six Signs Your Email Gateway Might Need Replacing
Many organisations are spending way too much money on licensing the their email SPAM and malware gateway...

PhishBusters Survey: Perception vs. Reality of Phishing Attacks
Cofense conducted a survey to examine the general public's perceptions of phishing attacks, including...
Sign up for Cyber Security Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.