Network Security

The Shared Responsibility Model Explained
In a cloud environment, your service provider takes on a share of many operational burdens, including...

Alphabet Soup: Making Sense of XDR, EDR, NDR, and SIEM
XDR, EDR, NDR, and SIEM. They are among the most prominent acronyms in cybersecurity. But what do they...

Why Security Needs An Application-Centric Lens
An application-centric view of security should be based on four critical security capabilities. We discuss...

Your Path to Zero Trust
In a business world without perimeters and dominated by remote work, finding a balance between easy collaboration...

Modern Blueprint to Insider Threat Management
Taking a People-Centric Approach to Your Insider Threat Management (ITM) Programme Insider threats can...

When Networks Meet The New Tomorrow
This paper looks at IT priorities that organizations will need to address now and in the new tomorrow:...

Escape the Ransomware Maze
Ransomware is an ever-evolving form of malware designed to steal business-critical data and then sell...

The Definitive Guide to Data Security Posture Management (DPSM)
DSPM charts a modern path for understanding everything that affects the security posture of your data....

Security Operations Maturity Model
A practical guide to assessing and improving the maturity of your security operations through Threat...

Modern Networking for the Borderless Enterprise
5 Ways Top Organizations Are Optimising Networking at the Edge. Enterprises are growing more dispersed...
Sign up for Cyber Security Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.