IT Security

The Virtual Floorplan: New Rules for a New Era of Work
The Virtual Floorplan: New Rules for a New Era of Work is a global report analyzing hybrid work, and...

You've Got BEC!
A Roundup of the 10 Biggest, Boldest, and Most Brazen Business Email Compromise Scams of 2020 and 2019. It's...

Open Channels, Hidden Threats
How Communication and Social Media Tools Are Changing the Insider Risk Equation for Compliance, IT and...

Moving Your Databases To The Cloud
Are you thinking about moving your Oracle databases to the cloud or making the transition to Database...

Centralised Control Simplifies Management, Boosts Security
Aquila Heywood wanted to update its privileged access management processes to increase data security...

Securing Privileged Accounts: Three Steps to Maximize Protection with MFA
Hackers are eyeing your privileged accounts, so you better be using more than 'admin123' to secure them. Multi-factor...

Managing Insider Threats in Financial Services
Financial services firms are victims of almost a quarter of all security breaches. And insiders contribute...
Sign up for IT Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.