Backups
Executive Brief: The Ransoming Of Higher Education
Coordinated attacks are hitting higher education institutions across the nation and around the world....
Security and risk management in the wake of the Log4j vulnerability
Security leaders agree: Log4j has irrevocably changed the risk landscape. Get a quick refresher on the...
Incident Response Use Cases
According to an IBM study, the vast majority of organisations surveyed are unprepared to respond effectively...
Deploying Flexible Data Protection to Support Cloud Workload Placement
Digital transformation (DX) projects are designed to help organizations better utilize data for competitive...
A Guide for SMBs: Can I really become “less hackable”?
After nearly 20 years working in cybersecurity, I am still asked the age-old question by business owners:...
Farewell ISDN. Hello All-IP.
Analogue and ISDN telephony is a thing of the past – telephony today is mostly internet-based. Voice-over-IP...
A Zombie's Survival Guide in a Changing Database World
With the rise of autonomous databases – and all the other scary changes in database management systems...
The Zero Trust Guide To Remote Worker Security
With the recent increase in the number of employees working from home as a result of the COVID-19 outbreak,...
The UK 2020 Databerg Report Revisited: Public Sector Edition
This UK Public Sector Databerg report surveyed senior Public Sector decision makers on the data challenges...
Business Value of Cloud Modernization
Explore the business value of proven modernization paths Understanding the business value of infrastructure...
2022 Voice of the CISO
Though less eventful than its predecessor, 2021 was another blockbuster year for cybersecurity. With...
Sign up for IT Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.