Service Providers

CISO's Guide to Third-Party Security Management
Managing your third-party vendors' security is crucial, but security assessments are riddled with problems. Lengthy...

Threat Briefing: Supply Chain Attacks
Cyber criminals are getting bolder and more sophisticated with their threats. Supply chain attacks can...

Microsoft Teams Backup - a Conversational Geek E-book
Learn everything you need to know about protecting Teams data from this Conversational Geek e-book by...

2021 State of the Threat in review
The State of the Threat report is compiled by the world-renowned Secureworks® Counter Threat Unit™...

2021 Technology Industry Cyber Threat Landscape Report
The technology industry is a top target for both cybercriminals and state-sponsored cyber espionage groups....

IT Executives Express the Need for True Cloud ERP
To discover how cloud-based ERP systems support and accelerate growing organisations, NetSuite engaged...

2022 Threat Report
The BlackBerry 2022 Threat Report is not a simple retrospective of the cyberattacks of 2021. It is a...

DDoS Threat Landscape Report: DDoS Trends from Q3 2022
DDoS attacks are growing larger, stronger, and more sophisticated. In Q3'22, we observed a resurgence...

The Impact of XDR in the Modern SOC
The buzz around extended detection and response (XDR) is building. But there's still a lot to learn about...

Brilliant Experiences, Channel by Channel
Communicating in ways that speak to each individual customer, is what allows brands to build strong relationships....

Make Artificial Intelligence Real
There's nothing artificial about making the world a better place. Over the last several decades, technology...

Slack is Custom-Built for Enterprise Companies
Over the past few weeks, we've all been challenged to rethink how our teams work together. We've had...
Sign up for IT Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.