Risk-Adaptive Data Security: The Behavior-Based Approach
This eBook addresses the challenge with DLP of either applying restrictive policies which slow down the...
The State of Office 365 Backup
Barracuda commissioned independent market researcher Centropy to conduct a survey of IT decision makers...
Driving Real Behaviour Change
Today's most potent cyber threat isn't a zero-day vulnerability, new malware or the latest exploit kit....
Confronting the NEW WAVE OF CYBERATTACKS
Like the virus responsible for the worldwide pandemic, email-based cyber threats continued to mutate...
Ensuring compliant communications in Financial Services
The pandemic has reshaped business in myriad ways, none so much as how people communicate. In a few months,...
10 Security Tips for Businesses
SECURITY THAT PROTECTS YOUR BUDGET Vanishing budgets, reckless users, infected machines, unpatched software...
Change management blueprint for contact centre digital transformation
The COVID-19 pandemic put organisational change into hyperdrive. Businesses were compelled to move to...
The 4 Benefits of VPN Elimination
The corporate perimeter as you know it no longer exists. Virtual private network (VPN) vulnerabilities...
Security Starts Here: Privileged Access Management
The threat of a security incident or critical error is very real, and it's something that auditors are...
Best-In-Class Email Marketing
Interactions between consumers and brands are increasingly playing out across a wide variety of different...
Top 10 Security Events to Monitor In Azure Ad and Office 365
Is your organization really more secure now that you're running applications in the cloud? More efficient,...
Aligning Cyber Skills To The MITRE ATT&CK Framework
The MITRE ATT&CK Framework is a comprehensive matrix of tactics and techniques used by threat hunters,...
Sign up for FinTech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.