Cloud Computing
The role of CIO in a world where experience rules
In recent years, the role of CIO has evolved to meet a wider set of responsibilities and aspirations....
Cybersecurity for the Modern Era
The book explores how cyber attacks and compliance issues are evolving and outlines how you can create...
Effective CISO Presentations to the Board: Top Tips & Checklist
As a CISO, you have crucial info to convey about cyber risk, and your board wants to hear it. In a recent...
Isolated Castles: Incident Response in the New Work From Home Economy
Since the shift to work from home, there's been a paradigm shift in the IT and security industry. The...
Compliance in the Age of Digital Collaboration
With new ways to collaborate through remote working, georgraphies and time zones - explore the challenges...
Rapid, Successive and at Scale
Disruption -- whether big (COVID-19) or small (new start-up competitors) -- has more or less become commonplace...
Windows Virtual Desktop Jumpstart
Not all applications are web-based or designed to run from the cloud. Many applications still require...
2022 Guide to Leading an Agent-Centric Contact Center
Finding and retaining great talent was never easy. But now? Effectively staffing and engaging employees...
Protection From the Perfect Storm
Connectedness is defining our lives as never before. With Internet-enabled IoT devices multiplying exponentially...
Cost of Insider Threats 2020 Report
The key takeaway is that, across all three insider threat types outlined above, both the frequency and...
A Five-Step Plan To Move Your Apps To The Cloud
It's easy to underestimate migration to the cloud. Teams often don't properly consider the complexity...
Sign up for IT Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.