IT Security
NIST Cybersecurity Framework
The document gives you an overview of the NIST Cybersecurity framework, an internationally widespread...
Securing Endpoints Amid New Threats
Giving employees the flexibility to be fully productive while working remotely makes it critical that...
Security Starts Here: Privileged Access Management
The threat of a security incident or critical error is very real, and it's something that auditors are...
Plan for a digitally-led future
Our research with Dods Group found that 85% of government decision-makers agreed 'the pandemic accelerated...
The SIEM Buyer's Guide for 2020
In 2020, security information event management (SIEM) solutions will be far more than an information...
Activate ESG Use Case Guide
Incorporating robust ESG practices into business strategy and execution is critical, not only to be a...
Spotlight: The State of the UK & Ireland Mid-Sized Business and IT
Medium-sized businesses are central to our economies, but this varied market is hard to analyse. So,...
GigaOm Radar for Phishing Prevention & Detection
Get your complimentary copy of this independent GigaOm Research report, which analyzes positioning and...
Sign up for IT Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.