Malware
How to Build a Micro-Segmentation Strategy
Micro-segmentation reduces your attack surface and prevents the spread of breaches inside your data center...
Networking and Information Systems (NIS) Directive
The NIS Directive has been designed to work alongside data protection legislation. It will be governed...
Splunk Predictions 2020
The future is data. In a rapidly digitizing world, data is at the root of every opportunity, and essential...
NAIKON: Traces from a Military Cyber-Espionage Operation
NAIKON is a threat actor that has been active for more than a decade. The group focuses on high profile...
The Top 5 Myths of Cloud Security
Hybrid cloud security is a hot topic, especially with the massive growth of public cloud providers like...
An introduction to ITM
As organisations move towards a more distributed workforce, the traditional perimeter of the office network...
How to Deploy a Comprehensive DevSecOps Solution
Securing DevOps is a complex undertaking, DevOps tools grow and change at a fast pace. Containers and...
The Impact of XDR in the Modern SOC
The buzz around extended detection and response (XDR) is building. But there's still a lot to learn about...
2022 Voice of the CISO
Though less eventful than its predecessor, 2021 was another blockbuster year for cybersecurity. With...
Learn how to build a business framework designed for data management
The center of a best practice approach must include a complete view into your organization and its technology...
Sign up for IT Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.