Compliance
Meaningful Metrics for Human Cyber Risk
By focusing on meaningful security metrics, organizations can benchmark, assess progress, and measure...
Cybersecurity for retail: Prevention is better than the cure
Prevention is almost always better than the cure. But how many organisations are living up to the promise...
Penetration Testing For Dummies
Target, test, analyze, and report on security vulnerabilities with pen-testing Pen-Testing is necessary...
3 technologies you need to future-proof your organization
New technology can be a scary thing. New processes to learn, new systems to teach your team and new ways...
Digital transformation for UK policing
Policing in the UK is a benchmark for other law enforcement agencies around the world. Innovation across...
A Spec for Success: Building within a Common Data Environment
In the decade since the 2009 economic downturn in the UK, there have been a number of changes in the...
Moving Your Databases To The Cloud
Are you thinking about moving your Oracle databases to the cloud or making the transition to Database...
Getting More from Less
IT and security professionals know that the threat landscape is dynamic. Every day, attackers are getting...
Advanced Application Threats Require and Advanced WAF
The threat landscape is dramatically different than it was just 5 years ago. A traditional web application...
11 Recommended Security Practices to Manage the Container Lifecycle
This paper details 11 recommended practices for DevSecOps teams needing to move to a more modern application...
Cybersecurity for the Modern Era
The book explores how cyber attacks and compliance issues are evolving and outlines how you can create...
IoT Smart Cities & Buildings
Many of today's commercial buildings predate modern energy-saving tools and techniques. That means they...
Sign up for IT Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.