Cloud Security

Securing Data and Collaboration in Office 365 for the Remote Workforce
With the surge in remote workplace collaboration, Office 365 today has emerged as the most popular SaaS...

Defending Ukraine: Early Lessons from the Cyber War
The latest findings in our ongoing threat intelligence efforts in the war between Russia and Ukraine,...

Raising the Bar for Web App and API Security
Most Web Application and API Security Isn't Enough Securing the web applications and APIs that underpin...

Proofpoint Information and Cloud Security Platform
The Proofpoint Information and Cloud Security platform combines many of our products to address secure...

Sophos 2022 Threat Report
Interrelated threats target an interdependent world. We believe that shifting the timescale of attack...

Building a Cloud-Native, Hybrid-Multicloud Infrastructure
Today's world is based on the hybrid cloud. Business interactions occur on-premises, through digital...

The Evolving Cybersecurity Landscape
Transformation to the cloud is no longer a choice but a business necessity. Whereas before the transition...

Why Security Needs An Application-Centric Lens
An application-centric view of security should be based on four critical security capabilities. We discuss...

The Data Breach is Coming from Inside the House
Real-Life Tales of Data Loss, Insider Threats and User Compromise Data doesn't lose itself. People lose...

The Three Keys to Secure and Successful Cloud Migrations
To make cloud transformations as efficient and successful as possible, companies must remain secure and...

Alphabet Soup: Making Sense of XDR, EDR, NDR, and SIEM
XDR, EDR, NDR, and SIEM. They are among the most prominent acronyms in cybersecurity. But what do they...

2021 Data Risk Report - Manufacturing
Our 2021 Manufacturing Data Risk Report focuses on the growing cybersecurity threats facing industrial...

Cloud Adoption and Risk Report
The recent work from home mandate has dramatically changed how we live and work. Organisations are getting...
Sign up for Cyber Security Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.