Data Security

First steps to data provisioning maturity
An organization's deepest insights are often derived from sensitive data. Responsible organizations know...

Cloud Data Security 2023 Report by ESG, a division of TechTarget
…More than half (59%) of respondents believe that more than 30% of their organization's sensitive data...

Three Reasons to Move from Legacy DLP
Changing your data loss prevention (DLP) solution is a major transition that can feel overwhelming. But...

2022 Cost of Insider Threats: Global Report
Independently conducted by Ponemon Institute External attackers aren't the only threats modern organisations...

6 Misconceptions about Collective Defense for Cybersecurity
Collective Defense uses collaboration and threat information sharing in new and powerful ways to reduce...

The Passwordless Future Report
Every company has to become a technology company in order to survive and thrive in today's competitive...

The Top 10 Biggest and Boldest Insider Threats
Over the last two years alone, insider security incidents have jumped 47%, with the average cost per...

For digital sovereignty and transparency in the cloud
Shared use of infrastructure not only saves resources but also enables companies to push ahead with digitalisation...

Pain & Progress: Cybersecurity and Business Risk Study
Despite their best efforts and investments, some organisations still experience difficulty as a result...

The State of Security within eCommerce
2020 is a year unlike any other. Among the many effects of the global pandemic is the significant increase...

CyberArk 2022 Identity Security Threat Landscape Report
A global report from CyberArk which shows that 79% of senior security professionals say that cybersecurity...

The Definitive Guide to Data Security Posture Management (DPSM)
DSPM charts a modern path for understanding everything that affects the security posture of your data....

Network Security Approaches and the Case for Zero Trust
Top executives say that legacy network technical baggage is holding them back from transforming their...
Sign up for Cyber Security Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.