Telecommunications
NAIKON: Traces from a Military Cyber-Espionage Operation
NAIKON is a threat actor that has been active for more than a decade. The group focuses on high profile...
Finding Revenue and Profit Growth Opportunities in Retail
In this whitepaper, learn how retailers can drive revenue and profit growth by using new technologies...
Cloud Data Security 2023 Report by ESG, a division of TechTarget
…More than half (59%) of respondents believe that more than 30% of their organization's sensitive data...
Multi-Factor Authentication Buyer's Guide
With the increase in phishing and data breaches over the last few years, the chances are that your login...
AI in Manufacturing and How it Improves Workforce Technology
Key issues such as Brexit, skills shortages and consistently sluggish productivity are squeezing profitability...
A Business Case for Customer Data Management
If you're reading this, you've already arrived at a couple of realizations: This guide will help you...
Cyber Attack Trends: Check Point’s 2022 Mid-Year Report
The war in Ukraine has dominated the headlines in the first half of 2022 and we can only hope that it...
Safeguard Your Infrastructure from Ransomware and Cyber Threats
Data, the new currency of the global economy, has become the single most valuable asset for a majority...
NETSCOUT Threat Intelligence Report 1H 2020
COVID-19 has driven both workforces and consumers online – but the lockdown also saw DDoS attack frequency...
2021 State of the Phish
There's no question that organisations (and individuals) faced many challenges in 2020, both new and...
Unified Promotions: An Offer Hard to Resist
Promotions are no longer a bait to lure customers and clear excess stock, they are now part of retailers'...
Sign up for IT Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.