Latest Whitepapers

Introducing a Cyber Security Service For Home WiFi
The renewal cycle for home WiFi routers is lengthy and involves users upgrading to a newer model once...

Phish in a Barrel: Real-World Cyber Attack Examples
What your users don't know about cyber threats can hurt them—and your organisation. They're constantly...

An Authentication Authority at Your Fingertips: PingFederate
Having an authentication authority within your infrastructure allows you to have a single source of truth...

WatchGuard Report: State of the Art Threat Hunting in Businesses
Threat hunting is a niche function often misunderstood, that can be defined as an analyst-centric process...

The CISO's Guide to Ransomware Prevention
Ransomware attacks have transformed the cyber attack landscape. These sophisticated and persistent threats...

For digital sovereignty and transparency in the cloud
Shared use of infrastructure not only saves resources but also enables companies to push ahead with digitalisation...

Cloud Adoption and Risk Report
The recent work from home mandate has dramatically changed how we live and work. Organisations are getting...

7 Habits of Highly Effective DevSecOps Teams
Security teams are responsible for safeguarding assets in the cloud to maintain compliance and eliminate...

The Evolution of Cybersecurity
Cybersecurity Through the Years As we look at the ever-increasing, technology-dependent cyber environment...

The State of Security within eCommerce
2020 is a year unlike any other. Among the many effects of the global pandemic is the significant increase...

Lay the Foundation for Zero Trust
Zero Trust has been a topic of discussion in the Federal Government for some time. However, the approach...

5 Tips for Managing Third-Party Risk
Across industries and around the world, executives remain preoccupied with digital transformation. According...
Sign up for Cyber Security Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.