IT Security
Advanced MySQL 8
Design cost-efficient database solutions, scale enterprise operations and reduce overhead business costs...
From Seismic Disruption to a New Era of Success
No one could have foreseen the terrible impact of the COVID-19 outbreak on humankind. In business too,...
Nasuni for Rapid Ransomware Recovery
The FBI's Cyber Crime division defines ransomware as 'an insidious type of malware that encrypts, or...
Automation antidotes for the top poisons in cybersecurity management
Cyberthreats are more imminent and dangerous than ever in terms of their persistence and severity. The...
Farewell ISDN. Hello All-IP.
Analogue and ISDN telephony is a thing of the past – telephony today is mostly internet-based. Voice-over-IP...
Vössing Case Study
As a leading engineering firm in consultancy, planning, project management, and construction supervision,...
A Zombie's Survival Guide in a Changing Database World
With the rise of autonomous databases – and all the other scary changes in database management systems...
Moving Endpoint Security to Predictive Cloud
Endpoint security is broken. Traditional antivirus (AV) vendors aren't keeping up with today's threats....
Sign up for FinTech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.