Applications
NAIKON: Traces from a Military Cyber-Espionage Operation
NAIKON is a threat actor that has been active for more than a decade. The group focuses on high profile...
Windows Server 2019 and PowerShell All-in-One For Dummies
Windows Server 2019 and PowerShell All-in-One For Dummies offers a single reference to help you build...
Addressing Multiple Concerns with a Single Solution
Organizations have been steadily implementing digital innovations for years, but recently the pace of...
Cloud Adoption Essentials Guide
Organizations have been moving more and more workloads to the cloud for some time, but this trend is...
Modernize the workforce experience
It's more than a concept, it's our approach to modernizing your workforce. Our products, solutions and...
Overcoming the Top Five Gaps in Office 365 Data Protection
Microsoft Office 365 is widely used. Whilst it does offer a variety of system availability and data protection...
Isolated Castles: Incident Response in the New Work From Home Economy
Since the shift to work from home, there's been a paradigm shift in the IT and security industry. The...
Why It Pays to Use Electronic Signature
In today's intensely competitive marketplace, the business world is moving rapidly to online transactions...
The Forrester New Waveâ„¢: Bot Management, Q1 2020
PerimeterX was named a leader in The Forrester New Waveâ„¢: Bot Management, Q1 2020. According to the...
Sign up for FinTech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.