Latest Whitepapers
Cloud and Web Security Challenges in 2022
Organisations' work environments have undergone rapid but lasting changes in the face of the recent health...
NAIKON: Traces from a Military Cyber-Espionage Operation
NAIKON is a threat actor that has been active for more than a decade. The group focuses on high profile...
Cloud Security Report 2022
Cloud adoption continues to permeate throughout organizations as they embrace agile software development....
Cybercrime Threatens the Digital Funnel
Cybercriminals are employing new attack methods on new digital surfaces, including digital marketing....
Delivering Real-time Cloud Security Without Trading Off Performance
There has been a long-standing tradeoff between security and performance, and security often gets the...
Build or Buy? Answering the Eternal Technology Question
The eternal technology question seems to be, “Build or buy?” It is usually posed when a technology...
Privileged Access Management Buyers' Guide
Security breaches show no signs of slowing, and credential theft headlines are the number one attack...
Sophos 2022 Threat Report
Interrelated threats target an interdependent world. We believe that shifting the timescale of attack...
Modern Blueprint to Insider Threat Management
Taking a People-Centric Approach to Your Insider Threat Management (ITM) Programme Insider threats can...
Sign up for Cyber Security Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.