Backups

Defend Yourself Against Ransomware and Other Types of Malware
The May 7, 2021, ransomware attack on U.S. fuel network Colonial Pipeline left millions afraid they couldn't...

Inside Complex Ransomware Operations and the Ransomware Economy
Ransomware operators have steadily become more sophisticated and more aligned with nation-state actors,...

Cyber Attack Trends: Check Point's 2022 Mid-Year Report
The war in Ukraine has dominated the headlines in the first half of 2022 and we can only hope that it...

Cyber Attack Trends: Check Point’s 2022 Mid-Year Report
The war in Ukraine has dominated the headlines in the first half of 2022 and we can only hope that it...

A Guide for SMBs: Can I really become 'less hackable'?
After nearly 20 years working in cybersecurity, I am still asked the age-old question by business owners:...

Advanced MySQL 8
Design cost-efficient database solutions, scale enterprise operations and reduce overhead business costs...

Adaptive Cloud Security for AWS
Amazon Web Services (AWS) is the largest provider of cloud computing services worldwide. AWS pioneered...

How media companies thrive in the digital age
As technology and media continue to evolve at a rapid pace, publishers, producers, editors, and filmmakers...

2022 Threat Report
The BlackBerry 2022 Threat Report is not a simple retrospective of the cyberattacks of 2021. It is a...

How 3 Leading Organizations Took the Fast Path to Cloud
VMware Cloud on AWS Case Studies. Whether you are faced with moving specific applications to the cloud,...

Incident Response Use Cases
According to an IBM study, the vast majority of organisations surveyed are unprepared to respond effectively...
Sign up for IT Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.