Latest Whitepapers
Using MITRE ATT&CK™ in Threat Hunting and Detection
Threat hunting is the process of proactively searching for malware or attackers that reside on your network...
2022 Annual State of Phishing Report
Enriched with robust threat intelligence from the Cofense Phishing Defense Center (PDC), which analyzes...
Cloud Data Security 2023 Report by ESG, a division of TechTarget
…More than half (59%) of respondents believe that more than 30% of their organization's sensitive data...
Public Sector Cloud Journey
As the government continues to move workloads to the cloud, many agencies are struggling to automate...
High Security “to Go”
In the wake of digitalisation, the trend towards mobile work practices is also leading to profound changes....
What is the Cost of a Misdirected Email?
The average number of misdirected emails is almost always higher than IT leaders estimate, making it...
The State of Security within eCommerce
2020 is a year unlike any other. Among the many effects of the global pandemic is the significant increase...
PCI Compliance Best Practices
The Payment Card Industry Data Security Standard (PCI DSS) has been in place since 2004, with the latest...
CMMC Compliance Guide
On January 1, 2020, the United States Department of Defense (DoD) released its Cybersecurity Maturity...
How To Simplify Security With Cybersecurity Mesh Architecture
Networks are becoming increasingly sophisticated and widely distributed, which is making them even more...
Back to the Basics: Cyber Hygiene Starts with Asset Management
The challenge: managing millions of dynamic, distributed and diverse assets while maintaining high standards...
Ransomware Case Studies
Ransomware is a simple name for a complex collection of security threats. Attacks can be short and brutal,...
Modern Networking for the Borderless Enterprise
5 Ways Top Organizations Are Optimising Networking at the Edge. Enterprises are growing more dispersed...
Sign up for Cyber Security Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.
