Internet of Things (IoT)
DDoS Attack Threat Landscape — Tracking DDoS Attack Trends in Q2'22
DDoS attacks are on the rise. Ransom attacks reached an all-time high in June 2022, the Ukraine-Russia...
Employees are choosing how they work
'The measure of intelligence is the ability to change.' To remain connected, productive and secure in...
Core connectivity: The key enabler of digital transformation
The phrase 'digital transformation' is a hot topic across industry right now. Based on the consultancy...
Securing high tech industry network data
We all understand the negative impact of data loss, so why is it that so many organisations seem to be...
Bloor Research Data Governance Market Update
Streaming analytics is a space that is largely built on the back of stream processing. In turn, stream...
Five Keys to Optimize Your Data Lake with Data Governance
This is a story about two data lakes. On the surface, they seem identical. Both hold the same volume...
Implementing the NIST Zero Trust Architecture with Zscaler
The National Institute of Standards and Technology (NIST) has defined the core components of zero trust...
Reduce Alert Fatigue in Your IT Environment
Security teams are tasked with managing a huge volume of alert logs, and this noise can overwhelm any...
Back to the Basics: Cyber Hygiene Starts with Asset Management
The challenge: managing millions of dynamic, distributed and diverse assets while maintaining high standards...
The CISO’s Guide to Effective Zero-trust Access
Best practices in network access stipulate a zero-trust access (ZTA) approach. CISOs looking to implement...
Sign up for IT Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.