Malware
Hindsight Is 2020 The Pandemic Provides a Wake-Up Call - Report
Hindsight Is 2020 — The Pandemic Provides A Wake-Up Call: Integrated Solutions Future-Proof Organizations. VMware...
The Case for Secure Communications
The tapping of voice communications has occurred virtually as long as electronic communication has been...
Social Engineering Handbook: How to Take the Right Action
The aim of this handbook is to help introduce social engineering and its risks to every employee in the...
PhishBusters Survey: Perception vs. Reality of Phishing Attacks
Cofense conducted a survey to examine the general public's perceptions of phishing attacks, including...
Security and risk management in the wake of the Log4j vulnerability
Security leaders agree: Log4j has irrevocably changed the risk landscape. Get a quick refresher on the...
A study of employee cybersecurity awareness in the Middle East
The cyber threat landscape in the Middle East is rapidly evolving, with cybercriminals increasingly targeting...
How Do Vulnerabilities Get Into Software?
There isn't a business today that doesn't produce or purchase applications in order to run more efficiently....
Automation antidotes for the top poisons in cybersecurity management
Cyberthreats are more imminent and dangerous than ever in terms of their persistence and severity. The...
Raising the Bar for Web Application and API Security Solutions
Securing the web applications and APIs that underpin cloud architectures is a challenge for security...
Sign up for IT Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.