Open Source

Application security, fallacies + realities
The news headlines have been filled with stories about security breaches in recent months. And most of...

What Makes Real Threat Intelligence
First popularized in terminology several years ago, threat intelligence means many things to many people....

CISO's Playbook to Cloud Security
To secure enterprise assets in the cloud, CISO's must address several new challenges unseen in traditional...

Build or Buy? Answering the Eternal Technology Question
The eternal technology question seems to be, 'Build or buy?' It is usually posed when a technology capability...

Penetration Testing For Dummies
Target, test, analyze, and report on security vulnerabilities with pen-testing Pen-Testing is necessary...

Understanding Augmented and Virtual Reality
In the book, A Whole New Mind: Why Right-Brainers Will Rule the Future, author Daniel Pink describes...

Migrate and Modernize Cloud Applications Securely and Efficiently
As businesses prioritize their cloud strategies, interest in, as well as adoption of public cloud continues...

Understanding Log Analytics at Scale
The humble machine log has been with us for many technology generations. The data that makes up these...

Securely Managing Your UNIX Environment
With today's stringent compliance environment, sophisticated and varied threats, and the demand of interoperability...

11 Recommended Security Practices to Manage the Container Lifecycle
This paper details 11 recommended practices for DevSecOps teams needing to move to a more modern application...
Sign up for IT Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.