IT Security

You've Got BEC!
A Roundup of the 10 Biggest, Boldest, and Most Brazen Business Email Compromise Scams of 2020 and 2019. It's...

Ransomware Protection with Pure Storage® and Commvault
Ransomware attacks continue to be top of mind for business and IT leaders. And for good reason. They...

Successful Microsoft Azure Migration with Quest Data Empowerment Tools
What if there was a model for methodically approaching migration of even your most entrenched relational...

Tanium Risk Assessment: Know Your IT Risk Score
Assess the risk of all your endpoints against multiple vectors — vulnerabilities, threats, compliance,...

Don't pay the ransom
In simple terms, ransomware is malicious software that either encrypts your data or otherwise stops you...

Business in the new economy landscape
How we coped with 2020 and looking ahead to a brighter 2021: The state of European midsized businesses. Medium-sized...

Top 3 Challenges Your Team Faces When Building in the Cloud
Today's cloud and security teams are asked to do more with less. Although the capabilities and cost of...

The Ponemon 2021 Cost of Phishing Study
The financial effects of phishing attacks have soared as organisations shift to remote and hybrid work....

The state of industrial security in 2022
Security for the industrial internet of things (IIoT) and operational technology (OT) is in its infancy...

Farewell ISDN. Hello All-IP.
Analogue and ISDN telephony is a thing of the past – telephony today is mostly internet-based. Voice-over-IP...

Building the Business Case for Improving Endpoint Security
As a security provider, we understand that convincing executives to make changes to their stack can be...

The Inner Circle Guide to Omnichannel
ContactBabel's Inner Circle Guide to Omnichannel explores the challenges and opportunities of offering...
Sign up for IT Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.