Latest Whitepapers

Cloud and Web Security Challenges in 2022
Organisations' work environments have undergone rapid but lasting changes in the face of the recent health...

Cybercrime Threatens the Digital Funnel
Cybercriminals are employing new attack methods on new digital surfaces, including digital marketing....

12 Steps for Stronger Ransomware Protection
Over the last few years, we have signed up hundreds of MSPs. We like to ask every new customer why they...

PhishBusters Survey: Perception vs. Reality of Phishing Attacks
Cofense conducted a survey to examine the general public's perceptions of phishing attacks, including...

Insider Threat Prevention Guide
In a perfect world, trust would never be violated. Cyber defenses would be impregnable. No employee would...

A Visual Landscape Of Cybersecurity
Our world has never moved faster in terms of cyber threats, security technology innovations and overall...

An Integrated Approach to Embedding Security into DevOps
Organizations are adopting DevOps as a development and operational model to facilitate the practice of...

The Increase in Mobile Wallet Adoption Impacts the Need for Security
The use of mobile payments is on the rise! According to industry data, mobile wallets are used by more...

Multi-Vector Protection
Educating users is an undeniably effective way to protect them from phishing and other malware, but it...

15 Ways Your Website is Under Attack
Web applications are the home of your business on the internet. The functionality within your website,...

Sophos 2022 Threat Report
Interrelated threats target an interdependent world. We believe that shifting the timescale of attack...
Sign up for Cyber Security Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.