Malware
The State of Threat Prevention: Evasive threats take Center Stage
Digital transformation has rendered many traditional security solutions useless in the face of modern...
NAIKON: Traces from a Military Cyber-Espionage Operation
NAIKON is a threat actor that has been active for more than a decade. The group focuses on high profile...
OWASP Top 10
The nonprofit Open Web Application Security Project (OWASP) works to improve the security of software,...
Getting Started with SASE
Secure Access Service Edge: A guide to secure and streamline your network infrastructure As enterprises...
Security Operations Use Case Guide
Responding to security incidents and vulnerabilities is an ongoing process, and you know that reacting...
Stopping BEC and EAC
Business email compromise (BEC) and email account compromise (EAC) are complex problems that require...
Lacework 2021 Cloud Threat Report, Volume 1
The Lacework Labs team provides quarterly reports focused on risks and threats relevant to cloud services,...
Instant data for real-time business results
Machine learning is evolving faster than ever – AI and analytics can give you the capabilities to become...
Don't Diverge—Converge
Digital acceleration is driving the adoption of hybrid IT architectures. These new hybrid environments...
10 Biggest and boldest insider threats
Over the last two years alone, insider security incidents have jumped 47%, with the average cost per...
CISO's Playbook to Cloud Security
To secure enterprise assets in the cloud, CISO's must address several new challenges unseen in traditional...
Human Factor Report 2021
Cybersecurity, Ransomware and Email Fraud in a Year that Changed the World As the global pandemic upended...
Networking and Information Systems (NIS) Directive
The NIS Directive has been designed to work alongside data protection legislation. It will be governed...
Sign up for IT Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.