Network Security
Using MITRE ATT&CKâ„¢ in Threat Hunting and Detection
Threat hunting is the process of proactively searching for malware or attackers that reside on your network...
How to Leverage O365 for a Zero Trust Strategy
Enterprise adoption of Microsoft Office 365 (O365) skyrocketed to over 258,000,000 users in 2020 and...
Insider Risk: Shifting the Focus With Zero Trust
Zero Trust assumes no entity is implicitly trusted regardless of whether it is internal or external to...
10 Key Questions to Include in Your Vendor Security Questionnaires
Today's perilous cyber world requires you to carefully check your vendors' security posture – typically...
Cloud and Web Security Challenges in 2022
Organisations' work environments have undergone rapid but lasting changes in the face of the recent health...
Public Sector Cloud Journey
As the government continues to move workloads to the cloud, many agencies are struggling to automate...
CMMC Compliance Guide
On January 1, 2020, the United States Department of Defense (DoD) released its Cybersecurity Maturity...
Farewell ISDN. Hello All-IP.
Analogue and ISDN telephony is a thing of the past – telephony today is mostly internet-based. Voice-over-IP...
Redefining the Role of the RTOS
The world of embedded systems is undergoing a profound evolution. Once isolated and purpose-built, embedded...
5 Tips for Managing Third-Party Risk
Across industries and around the world, executives remain preoccupied with digital transformation. According...
Sophos 2022 Threat Report
Interrelated threats target an interdependent world. We believe that shifting the timescale of attack...
5 Benefits of Partnering with Webroot
While cyberattacks continue to evolve in volume, organization, and sophistication, security technology...
Why Security Needs An Application-Centric Lens
An application-centric view of security should be based on four critical security capabilities. We discuss...
Sign up for Cyber Security Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.