Latest Whitepapers
TLS Best Practices
The truth is, a simple lapsed certificate can become a time-consuming headache. Unfortunately, 60% of...
How to Help Prevent Increasingly Rampant Brand Exploitation
Brands have been the unwitting victims of scams since time immemorial. Now, in the age of phishing, it's...
Quantifying the Impact of Credential Stuffing and Account Takeovers
Bad bots represent a growing problem for e-commerce businesses. They directly affect e-commerce KPIs...
Cyber-resiliency Maturity in Servers
Cyber resiliency is now an essential requirement for any business. Given the threat to data and IT servers,...
Multi-Factor Authentication Guide to On-Premise MFA
Despite the advantages of moving to the cloud and in spite of security assurances, there are still organisations...
Moving to a Cloud Data Warehouse on Amazon Redshift
The challenge for today's enterprises is to extract the most value from their data. To do so, companies...
The Hybrid Workplace: Adapting to the New Normal with Aruba ESP
In the past few decades, technology has shifted how we live, work, and interact with others. This mobile...
The State of Office 365 Backup
Barracuda commissioned independent market researcher Centropy to conduct a survey of IT decision makers...
The Future of Network Security: EMEA
IT and security leaders face a transforming digital world. In order to meet the needs of an evolving...
Sign up for IT Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.