Latest Whitepapers
The Anatomy of Account Takeover Attacks
Bad bots are on every website with a login page. Even yours. Hackers and fraudsters use bots to validate...
Winning in the New Era of Data Management
In the data-driven age, information is as valuable as currency. Entire industries are being disrupted...
Tackling Content Sprawl with Governance Designed to Support Remote Work
In the heart of central London is a workplace specialist built withsomething different. While the historic...
2021 Thales Cloud Security Study
The pandemic has pushed organisations into many changes in the last year but the move to greater use...
2020 CIO Cloud Data Management Initiatives
According to the results of Frost and Sullivan's Digital Transformation survey, 99% of businesses are...
Oracle Cloud@Customer Brings Full Cloud Experience On-Premises
Oracle Autonomous Database on Exadata Cloud@Customer and Dedicated Region Cloud@Customer powered by 2nd...
You've Got BEC!
A Roundup of the 10 Biggest, Boldest, and Most Brazen Business Email Compromise Scams of 2020 and 2019. It's...
Taking Control of Your Office 365 Data
Modern software-as-a-Service (SaaS) applications such as Microsoft Office 365 can offer several advantages...
Adaptive Multi-Factor Authentication
This white paper provides an overview of Okta Adaptive Multi-factor Authentication (MFA). For security...
Report: ICS/OT Cybersecurity 2021 Year in Review
Dragos is excited to present the fifth year of the annual Dragos Year In Review report on Industrial...
Understanding cybersecurity workforce problems and solutions in 2021
The findings in this large-format survey reinforce existing statistics and, in certain instances, actually...
Sign up for IT Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.