Applications
Why Security Needs An Application-Centric Lens
An application-centric view of security should be based on four critical security capabilities. We discuss...
6 Smart Ways to Fuel Business Growth
Growth. It's the holy grail for any business. But how do you unlock it? Download this eBook to learn...
Does Your Data Integrity Need a Check-Up?
In the Healthcare and Pharmaceutical industries, data integrity can be a matter of life or death. Patients...
The State of Application Security in 2021
Barracuda commissioned independent market researcher Vanson Bourne to conduct a global survey of 750...
CISSP For Dummies
Secure your CISSP certification! If you're a security professional seeking your CISSP certification,...
How financial firms use Box to build stellar experiences
From ordering takeout on an app to joining video calls, the way your customers work and play is constantly...
Driving Radical Business Transformation
Increasing Productivity, Unlocking New Revenues, and Powering Competitive Advantage For many years, IT...
NAIKON: Traces from a Military Cyber-Espionage Operation
NAIKON is a threat actor that has been active for more than a decade. The group focuses on high profile...
Hope is NOT a strategy: Secure your business with the Content Cloud
Seems like every week there's news of another cybersecurity breach. Ponemon Institute has found that...
Using MITRE ATTandCKâ„¢ in Threat Hunting and Detection
MITRE ATTandCK â„¢ is an open framework and knowledge base of adversary tactics and techniques based...
The AI & Machine Learning Imperative
Companies across various industries are seeking to integrate AI & machine learning (ML) into workflows...
Cloud-delivered security for the digital workspace
With the adoption of hybrid cloud and the rise in remote work, traditional connectivity models like VPN...
Sign up for IT Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.