Mobile Devices
Penetration Testing For Dummies
Target, test, analyze, and report on security vulnerabilities with pen-testing Pen-Testing is necessary...
A Spec for Success: Building within a Common Data Environment
In the decade since the 2009 economic downturn in the UK, there have been a number of changes in the...
Stopping BEC and EAC Scams: A Guide for CISOs
Business email compromise (BEC) and email account compromise (EAC) are complex problems that require...
An Authentication Authority at Your Fingertips: PingFederate
Having an authentication authority within your infrastructure allows you to have a single source of truth...
Analog Devices Automates its Threat Response Process
Analog Devices (ADI) is a Fortune 100 company and a world leader in the design, manufacture, and marketing...
Understanding Augmented and Virtual Reality
In the book, A Whole New Mind: Why Right-Brainers Will Rule the Future, author Daniel Pink describes...
Has Self-Scanning Gone Mainstream?
Self-scanning or Scan and Go shopping experiences were already making steady inroads across Europe entering...
Don't pay the ransom
In simple terms, ransomware is malicious software that either encrypts your data or otherwise stops you...
Security Control Guide: Hardened Services Guide
System Hardening is the process of securing a system's configuration and settings to reduce IT vulnerability...
Common Browser Isolation Challenges and How to Overcome Them
Every security team wants to keep their employees and data safe from the latest threats. To accomplish...
Employees are choosing how they work
'The measure of intelligence is the ability to change.' To remain connected, productive and secure in...
How to Leverage O365 for a Zero Trust Strategy
Enterprise adoption of Microsoft Office 365 (O365) skyrocketed to over 258,000,000 users in 2020 and...
Sign up for IT Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.