IT Management
Ransomware Case Studies
Ransomware is a simple name for a complex collection of security threats. Attacks can be short and brutal,...
Migrating Apps to the Cloud in 5 Steps
Cloud applications, platforms and services are changing the way enterprises compete for customers. The...
How Proofpoint EFD Is More Than Just DMARC
A raft of solutions have sprung up to help organisations set up and manage their DMARC strategies. Like...
Digital acceleration in the time of coronavirus
Business decision-makers around the world were collectively blindsided by the scale and speed that working...
Meeting Man Group's Security Needs with Slack Enterprise Grid
Learn how a global investment firm of 1,400 employees made an immediate transition in response to Covid-19. This...
Simplified Zero Trust Segmentation with Illumio Core
Modern ransomware is one of the most significant cybersecurity threats to critical services, compute...
Building the foundation of a mature threat hunting program
Many organizations, especially large global enterprises, don't always have the best visibility into how...
The C-suite guide to building an ESG foundation
Environmental, social and governance (ESG) is a key imperative for the C-suite. Read this recap to learn...
Ponemon Cost of Insider Threats Global Report
Independently conducted by Ponemon Institute External attackers aren't the only threats modern organisations...
The State of Application Security in 2021
Barracuda commissioned independent market researcher Vanson Bourne to conduct a global survey of 750...
Infrastructure Monitoring 101
For any sized company, the rapidly expanding implementation of today's technology creates unique and...
Sign up for IT Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.