Telecommunications

NAIKON: Traces from a Military Cyber-Espionage Operation
NAIKON is a threat actor that has been active for more than a decade. The group focuses on high profile...

IDC: Strategies for Building Digital Infrastructure Resiliency
Multiple generations of applications. Multiple generations of infrastructure. Is there a way to reduce...

GigaOm Radar for DDoS Protection
Cloudflare ranked higher than any other assessed vendor and is named a 'Leader' and 'Fast-mover'' in...

Making all the right connections
Ask someone how they feel about a company, and they'll have an immediate response. All too often it's...

Modern Blueprint to Insider Threat Management
Taking a People-Centric Approach to Your Insider Threat Management (ITM) Programme. Insider threats can...

Book of Knowledge: Employee Experience
Keeping employees engaged, productive, and connected has never been more important—or more difficult....

Intelligent Authentication and Fraud Prevention Intelliview
In this third annual Intelliview, Opus Research and SymNex Consulting provide enterprise decision-makers...

Networking and Information Systems (NIS) Directive
The NIS Directive has been designed to work alongside data protection legislation. It will be governed...

ESG Distributed Cloud Series Study 2: Cloud-native Applications
IT organizations are trying to keep their businesses running while migrating to modern, future-proof...

5 Signs MDR Is Right for Your Organization
Perhaps you've been considering a managed detection and response (MDR) solution, but you aren't quite...

Flexible for the future
IT decision makers are tackling a major challenge: how can we architect our IT in a way to maximise access...
Sign up for IT Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.