Applications
Combining IT operations management and security operations using AIOps
Our world of work continues to change at an ever-increasing pace—amidst more threats, and new security...
The State of Security within eCommerce
2020 is a year unlike any other. Among the many effects of the global pandemic is the significant increase...
Using MITRE ATTandCKâ„¢ in Threat Hunting and Detection
MITRE ATTandCK â„¢ is an open framework and knowledge base of adversary tactics and techniques based...
Secure Access To Over 150 Systems, For Over 2000 Diverse Users
A global leader in the field of smart energy was looking to provide better and secure remote access to...
2022 Threat Report
The BlackBerry 2022 Threat Report is not a simple retrospective of the cyberattacks of 2021. It is a...
The PC Lifecycle Continuum: From Control to Transformation
As diverse organizations seek to implement data-driven strategies, the personal computer in all its varieties...
The state of Office 365 backup
Barracuda commissioned independent market researcher Centropy to conduct a survey of IT decision makers...
CIO Essential Guidance: Intrinsic Security
Despite massive spend to protect enterprise digital assets, security breaches are still on the rise....
App Development as a Core Business Capability
Many organisations now understand the critical role that apps play in enabling their people, as well...
Citrix SD-WAN for Azure Virtual WAN
A partnership that puts you first. Citrix is a Microsoft Virtual WAN preferred partner. This means that...
Sign up for IT Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.