Malware
User Risk Report 2018
Risky end-user behaviours are impacting organisations around the world, with implications that can be...
The Impact of XDR in the Modern SOC
The buzz around extended detection and response (XDR) is building. But there's still a lot to learn about...
Confronting the NEW WAVE OF CYBERATTACKS
Like the virus responsible for the worldwide pandemic, email-based cyber threats continued to mutate...
5 Things You Didn't Know About DDoS Attacks That Can Cost You
To accurately determine your organization's risk of a DDoS attack, you must be aware of the latest trends...
Cybersecurity For Dummies
Advanced threats have changed the world of enterprise security and how organizations are attacked. These...
The State of Threat Prevention: Evasive threats take Center Stage
Digital transformation has rendered many traditional security solutions useless in the face of modern...
The SIEM Buyer's Guide for 2020
In 2020, security information event management (SIEM) solutions will be far more than an information...
The Essential Guide To Machine Data
Machine data is one of the most underused and undervalued assets of any organization, yet it contains...
When Networks Meet The New Tomorrow
This paper looks at IT priorities that organizations will need to address now and in the new tomorrow: +...
PhishBusters Survey: Perception vs. Reality of Phishing Attacks
Cofense conducted a survey to examine the general public's perceptions of phishing attacks, including...
Protecting The End User
A people-centric approach to managing vulnerability, attacks and privilege. Organisations are spending...
Threats to DNS Are Threats to Your Business. What You Can Do
DNS is a foundational part of the internet, and its hierarchal structure is well known and understood....
Sign up for IT Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.