Risk-Adaptive Data Security: The Behavior-Based Approach
This eBook addresses the challenge with DLP of either applying restrictive policies which slow down the...
A Phoney Prediction
While video communications became hugely popular for teams during 2020/1 looking to connect face-to-face,...
Your Path to Zero Trust
In a business world without perimeters and dominated by remote work, finding a balance between easy collaboration...
13 Email Threat Types To Know About Right Now
Traditional email security doesn't cut it anymore. In today's rapidly evolving environment, traditional...
Python for Data Science For Dummies, 2nd Edition
The fast and easy way to learn Python programming and statistics Python For Data Science For Dummies...
Power Platform Jumpstart
The Cognizant Microsoft Business Group takes you through automation journey possibilities, demonstrating...
Security Starts Here: Privileged Access Management
The threat of a security incident or critical error is very real, and it's something that auditors are...
How to Stop Business Email Compromise Threats
While staggering ransomware demands tend to hog the headlines, Business Email Compromise (BEC) is one...
Privileged Access and the Impact of Pass the Hash Attacks
The goal of this survey was to capture hard data on current experiences, trends and approaches to Identity...
2021 Voice of the CISO Report
There's no question that 2020 was a challenging year. The pandemic placed an enormous strain on the global...
Sign up for FinTech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.