Telecommunications
Beyond Awareness Training
Building a Sustainable Security Culture – and Why it Matters. Most cybersecurity leaders know that...
Digital Transformation
Are organisations considering the essential foundations for digital transformation programmes to succeed? Our...
An Authentication Authority at Your Fingertips: PingFederate
Having an authentication authority within your infrastructure allows you to have a single source of truth...
NAIKON: Traces from a Military Cyber-Espionage Operation
NAIKON is a threat actor that has been active for more than a decade. The group focuses on high profile...
The Business Value of Red Hat Enterprise Linux
Linux has firmly established itself as a preferred delivery vehicle for modern applications, in addition...
CIO Priorities: Forcing Business to Evolve
It's apparent now that the forces pushing for businesses to embrace technology to modernization are unstoppable....
Organizations Accelerating Their Digital Workplace Achieve Improvements
This study sought to understand whether, and to what degree, an organization's adoption of modern device...
A Historic Opportunity for Public Sector
Discover the 8 mega trends in the public sector. Why the public sector has a golden opportunity and how...
Threat Briefing: Supply Chain Attacks
Cyber criminals are getting bolder and more sophisticated with their threats. Supply chain attacks can...
Digital acceleration in the time of coronavirus
Business decision-makers around the world were collectively blindsided by the scale and speed that working...
Long-Term Data Retention with Veritas NetBackup
This white paper provides a technical overview of cloud storage as a long-term retention storage solution...
Sign up for IT Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.