Cloud Computing

Using MITRE ATTandCKâ„¢ in Threat Hunting and Detection
MITRE ATTandCK â„¢ is an open framework and knowledge base of adversary tactics and techniques based...

Phishing Resilience on the Mainframe
Like any other platform, the mainframe is susceptible to cyberattacks. Nefarious practices like phishing...

The SIEM Buyer's Guide for 2020
In 2020, security information event management (SIEM) solutions will be far more than an information...

Futureproofing IoT
Greater connectivity will bring huge opportunities, but companies and the public must be wary of threats...

10 Key Questions to Include in Your Vendor Security Questionnaires
Today's perilous cyber world requires you to carefully check your vendors' security posture – typically...

Complete Cloud Security for Professional Services
Thales have a long history in securing some of the world's most sensitive data, and professional service...

Decoupling security from the network: The evolution of segmentation
You rely on the network to deliver applications. But as IT scales in size, connectivity, and environments...

Four Reasons to Rethink Your ERP Vendor
Read this guide for everything you need to know about enterprise cloud applications, the questions you...

Cyberthreats: A 20-Year Retrospective
Annual threat reports provide an opportunity to look back at significant events of the past 12 months...

Taking Healthcare to the Edge
A global pandemic now extending into its second year has caused disruption, dislocation and distress...

Using MITRE ATT&CKâ„¢ in Threat Hunting and Detection
MITRE ATT&CK â„¢ is an open framework and knowledge base of adversary tactics and techniques based on...

15 Ways Your Website is Under Attack
Web applications are the home of your business on the internet. The functionality within your website,...

The edge advantage
Reduce costs and improve performance with edge computing. Read The edge advantage, and you'll understand...
Sign up for IT Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.