Security Solutions
Cybersecurity Insiders: Cloud Security Report
The 2019 Cloud Security Report from Cybersecurity Insiders highlights what is and what is not working...
Six Steps to Successful and Efficient Threat Hunting
Rather than waiting for an alert, threat hunters proactively assume that an advanced adversary operates...
The state of Office 365 backup
Barracuda commissioned independent market researcher Centropy to conduct a survey of IT decision makers...
Advanced Email Security
Email is a fundamental feature of modern business. Yet it is also the number one threat vector. Email...
CISSP For Dummies
Secure your CISSP certification! If you're a security professional seeking your CISSP certification,...
You've Got BEC!
A Roundup of the 10 Biggest, Boldest, and Most Brazen Business Email Compromise Scams of 2020 and 2019. It's...
The State of Application Security in 2021
Barracuda commissioned independent market researcher Vanson Bourne to conduct a global survey of 750...
Assess Your Endpoint Security: MITRE Engenuity ATTandCK Evaluations
Making a decision on endpoint security tools is complex, so access to objective vendor-neutral information...
Ransomware Threat Briefing
Cyber criminals are getting bolder and more sophisticated with their threats. No matter what kind of...
Securing Microsoft 365 with Fortinet Security Fabric
The Fortinet Security Fabric provides broad, integrated, and automated protection across the organization—on-premises,...
Part Three- Futureproofing your cybersecurity strategy
A VIP or executive impersonation attack occurs when a bad actor poses as a trusted leader within an organization....
Sign up for IT Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.