Latest Whitepapers
How To Stop Lateral Attacks With Workload Microsegmentation
Network segmentation is a widely accepted tool for improving performance and boosting security. By splitting...
Inside Complex Ransomware Operations and the Ransomware Economy
Ransomware operators have steadily become more sophisticated and more aligned with nation-state actors,...
Using MITRE ATT&CKâ„¢ in Threat Hunting and Detection
Threat hunting is the process of proactively searching for malware or attackers that reside on your network...
BNPL Consumer Research Report 2022
Buy Now, Pay Later (BNPL) financing has become hugely popular over the last few years. However, as BNPL...
Zero Trust Privilege for dummies
Cyber breaches are bigger and worse than ever. Hardly a day goes by without headlines about some new...
Securing Data and Collaboration in Office 365 for the Remote Workforce
With the surge in remote workplace collaboration, Office 365 today has emerged as the most popular SaaS...
5 Tips for Modernizing a Security Operations Center
When an organization decides to modernize a Security Operations Center (SOC) or implement a more formal...
Cloud Security Report 2022
Cloud adoption continues to permeate throughout organizations as they embrace agile software development....
The CISO's Guide to Ransomware Prevention
Ransomware attacks have transformed the cyber attack landscape. These sophisticated and persistent threats...
PCI Compliance Best Practices
The Payment Card Industry Data Security Standard (PCI DSS) has been in place since 2004, with the latest...
What is the Cost of a Misdirected Email?
The average number of misdirected emails is almost always higher than IT leaders estimate, making it...
Building the foundation of a mature threat hunting program
Many organizations, especially large global enterprises, don't always have the best visibility into how...
First steps to data provisioning maturity
An organization's deepest insights are often derived from sensitive data. Responsible organizations know...
Sign up for Cyber Security Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.
