Malware
The Impact of XDR in the Modern SOC
The buzz around extended detection and response (XDR) is building. But there's still a lot to learn about...
Rackspace Fanatical Support for AWS
As organizations move their workloads from traditional data centers to AWS, IT security paradigms are...
Part Two- Futureproofing your cybersecurity strategy
This past year was the worst year on record for cybersecurity, and phishing was the biggest culprit....
Top 3 challenges your team faces when building in the cloud
Learn the root causes of the challenges your cloud and security teams are facing and see how these challenges...
From Seismic Disruption to a New Era of Success
No one could have foreseen the terrible impact of the COVID-19 outbreak on humankind. In business too,...
Lacework 2021 Cloud Threat Report, Volume 1
The Lacework Labs team provides quarterly reports focused on risks and threats relevant to cloud services,...
Breaking Down BEC
The Modern CISO's Framework for Identifying, Classifying and Stopping Email Fraud Business email compromise...
Centralised Control Simplifies Management, Boosts Security
Aquila Heywood wanted to update its privileged access management processes to increase data security...
The Zero Trust Guide To Remote Worker Security
With the recent increase in the number of employees working from home as a result of the COVID-19 outbreak,...
Ransomware Survival Guide
Be Ready for Ransomware Ransomware is an old threat that just won't go away. While overall volumes have...
Sign up for IT Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.