IT Management
Lay the Foundation for Zero Trust
Zero Trust has been a topic of discussion in the Federal Government for some time. However, the approach...
Driving Real Behaviour Change
Today's most potent cyber threat isn't a zero-day vulnerability, new malware or the latest exploit kit....
Small IT Department Structure: Meeting Business Needs
There's no easy day for IT teams at small to medium-sized businesses (SMBs). You don't have the massive...
Leadership trends report: Global app development roadmap 2022-2025
Digital leaders need to keep pace as new technologies are adopted across the enterprise, but today most...
The Essential Guide To Security
With digital technology touching every part of our lives and new threats popping up daily, it is imperative...
Digital Acceleration in the line of coronavirus
A global survey of 600 technology decision-makers conducted by MIT Technology Review Insights, in association...
The Case for Secure Communications
The tapping of voice communications has occurred virtually as long as electronic communication has been...
Reinventing work - New imperatives for the future of working
Following one of the most challenging years in business history, the pandemic has forced every company...
The CISO’s Guide to Effective Zero-trust Access
Best practices in network access stipulate a zero-trust access (ZTA) approach. CISOs looking to implement...
The VMware Guide to Disaster Recovery Readiness
When it comes to data, planning for the unexpected is of paramount importance—especially today. But...
The CIO's Guide to Identity Driven Innovation
Today's CIOs are increasingly accountable for more than just enabling the organisation with tools and...
Breaking Down BEC
The Modern CISO's Framework for Identifying, Classifying and Stopping Email Fraud Business email compromise...
Sign up for IT Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.