Latest Whitepapers
Defending Ukraine: Early Lessons from the Cyber War
The latest findings in our ongoing threat intelligence efforts in the war between Russia and Ukraine,...
NERC CIP Best Practices: The Tripwire Approach
Industrial operators beholden to the North American Electric Reliability Corporation Critical Infrastructure...
Guidelines for an Effective Cybersecurity Incident Response Plan
Organizations with a cybersecurity incident response plan experience a lower average cost (by $2.46M)...
Six Signs Your Email Gateway Might Need Replacing
Many organisations are spending way too much money on licensing the their email SPAM and malware gateway...
UK National Cyber Strategy: BAE Systems Response
The new UK National Cyber Strategy represents a key moment in cyber policy and ambitions. Here, we reflect...
Proofpoint Security Awareness Training
Proofpoint Security Awareness Training Enterprise helps you deliver the right training to the right people...
Elastic Cloud Gateways: The Evolution of Secure Cloud Access
Enterprise security groups today face a daunting task. While their core responsibility of protecting...
Securing Data and Collaboration in Office 365 for the Remote Workforce
With the surge in remote workplace collaboration, Office 365 today has emerged as the most popular SaaS...
Proofpoint Information and Cloud Security Platform
The Proofpoint Information and Cloud Security platform combines many of our products to address secure...
Build or Buy? Answering the Eternal Technology Question
The eternal technology question seems to be, “Build or buy?” It is usually posed when a technology...
The Passwordless Future Report
Every company has to become a technology company in order to survive and thrive in today's competitive...
The Anatomy of an Insider Threat Investigation: A Visual Guide
For decades, perimeter-based security strategies have been the starting point for most cybersecurity...
Escape the Ransomware Maze
Ransomware is an ever-evolving form of malware designed to steal business-critical data and then sell...
Sign up for Cyber Security Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.
