IT Security
Report Summary: TLS 1.3 Adoption in the Enterprise
This research project sought to gauge awareness of and adoption plans for the new TLS 1.3 specification...
The state of industrial security in 2022
Security for the industrial internet of things (IIoT) and operational technology (OT) is in its infancy...
Activate ESG use case guide: Discover how ServiceNow drives ESG impact
Environmental, Social, and Governance (ESG) is about driving business growth while building a more sustainable,...
GigaOm Radar for Phishing Prevention & Detection
Get your complimentary copy of this independent GigaOm Research report, which analyzes positioning and...
Cyber Attack Trends: Check Point's 2022 Mid-Year Report
The war in Ukraine has dominated the headlines in the first half of 2022 and we can only hope that it...
Security and risk management in the wake of the Log4j vulnerability
Security leaders agree: Log4j has irrevocably changed the risk landscape. Get a quick refresher on the...
The State of SD-WAN, SASE and Zero Trust Security Architectures
The purpose of this research is to learn important information about the use of Software-defined Networking...
Ransomware Survival Guide
Be Ready for Ransomware Ransomware is an old threat that just won't go away. While overall volumes have...
Data Loss Prevention and Digital Transformation
Today's digital age has produced unprecedented amounts of data. Much of this data is considered sensitive,...
High Security 'to Go'
In the wake of digitalisation, the trend towards mobile work practices is also leading to profound changes....
Sign up for IT Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.