IT Management

Threat Brief: Cloud Account Compromise and Takeover
Cyber criminals are getting bolder and more sophisticated with their threats. As more business assets...

Maintaining the Health of Your Active Directory Infrastructure
Just like with the human body, proper care can assist in the longevity and good health of your Active...

CISO’s Guide to Choosing an Automated Security Questionnaire Platform
Failing to adequately screen suppliers' security can lead to data breaches, which can shut down operations,...

Change management blueprint for contact centre digital transformation
The COVID-19 pandemic put organisational change into hyperdrive. Businesses were compelled to move to...

Measuring Cyber Security Culture
It's clear, and it has been for a long time, that traditional tickbox security awareness training efforts...

Tackling Content Sprawl with Governance Designed to Support Remote Work
In the heart of central London is a workplace specialist built withsomething different. While the historic...

High Speed Network Encryption
High Speed Encryption (HSE) secures data in transit and data in motion, as it moves across the network...

Windows Server 2019 and PowerShell All-in-One For Dummies
Windows Server 2019 and PowerShell All-in-One For Dummies offers a single reference to help you build...

Secure Beyond Breach
Securing the perimeter is no longer enough. The focus has shifted to ensuring your organization continues...

Three Benefits of Building an Intentional Remote-First Work Strategy
A majority of companies worldwide have an ad-hoc telecommuting policy. Most organisations likely adopted...

Optimizing Workload Placement in Your Hybrid Cloud
Many IT organizations are in the process of modernizing their infrastructure, as part of either a digital...
Sign up for IT Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.