Mobile Devices
Challenging Times Call for a Cybersecurity Plan of Action
Could there be a more 'exciting' time to be a cybersecurity executive? Some might choose other adjectives:...
Don't pay the ransom
In simple terms, ransomware is malicious software that either encrypts your data or otherwise stops you...
2022 Threat Report
The BlackBerry 2022 Threat Report is not a simple retrospective of the cyberattacks of 2021. It is a...
GigaOm Radar for Phishing Prevention & Detection
Get your complimentary copy of this independent GigaOm Research report, which analyzes positioning and...
Cyber Attack Trends: Check Point's 2022 Mid-Year Report
The war in Ukraine has dominated the headlines in the first half of 2022 and we can only hope that it...
Penetration Testing For Dummies
Target, test, analyze, and report on security vulnerabilities with pen-testing Pen-Testing is necessary...
Securing web applications in healthcare
You might think that healthcare would not be a target for criminals, but WannaCry – a strain of ransomware...
Parivartana - The Role of Data and Analytics in Social Transformation
From personalized healthcare to digital farming, and from energy management to digital governance solutions,...
Osterman Research: How to Comply with the CPRA Report
With the unprecedented ability of organizations to digitally collect, process and sell personal data...
CyberArk 2022 Identity Security Threat Landscape Report
A global report from CyberArk which shows that 79% of senior security professionals say that cybersecurity...
Case Study – Asda
Asda is a UK supermarket retailer, based in Leeds. The business serves more than 18 million customers...
Cybercrime tactics and techniques
2019 is off to an action-packed start in cybercrime. From a steadfast increase of pervasive Trojans to...
Sign up for IT Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.