Cloud
How Proofpoint EFD Is More Than Just DMARC
A raft of solutions have sprung up to help organisations set up and manage their DMARC strategies. Like...
Stopping Ransomware: Dispatches from the Frontlines
No organization wants to discover a ransomware attack unfolding in their environment, but if you can...
Step-By-Step Cloud Evolution with Microsoft Azure
IT transformation is more than a one-time migration of applications to the cloud, it's an ongoing process...
Measuring Security Awareness Impact for Long-Term Success
Most security leaders know that an effective security awareness program can play an outsized role in...
Cybercrime Tactics and Techniques - Attack on Home Base
The coronavirus pandemic has left the world looking very different at the end of the quarter than it...
Remote Working 2020: Advantages and Challenges
Remote working has now become the norm for most office workers due to lockdown measures and social distancing...
Insurance MFA case study – on-premise and multiple integrations
UNIQA Czech Republic is part of one of the leading insurance groups, UNIQA, located in Austria, Central...
How Effective Retailers Balance Customer Engagement and PCI Compliance
For CIOs of retail organizations, compliance with Payment Card Industry (PCI) standards is a top concern,...
Stopping BEC and EAC Scams: A Guide for CISOs
Business email compromise (BEC) and email account compromise (EAC) are complex problems that require...
DDoS attack trends for Q2 2021
Cloudflare's network protects approximately 25 million Internet properties, giving us deep insight into...
Data as a Strategic Growth Asset in 2021
In Q1 of 2021, WBR Insights surveyed 100 Chief Data Officers and similar from buy-side and sell-side...
Sign up for IT Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.