Malware
The Solarwinds Tipping Point
In December 2020, hackers had broken into several federal government computer networks and the attack...
How Do Vulnerabilities Get Into Software?
There isn't a business today that doesn't produce or purchase applications in order to run more efficiently....
Insider Threat Prevention Guide
In a perfect world, trust would never be violated. Cyber defenses would be impregnable. No employee would...
Cybercrime tactics and techniques
2019 is off to an action-packed start in cybercrime. From a steadfast increase of pervasive Trojans to...
Advanced Email Security
Email is a fundamental feature of modern business. Yet it is also the number one threat vector. Email...
Cybersecurity for the Modern Era
The book explores how cyber attacks and compliance issues are evolving and outlines how you can create...
Cloud Workload Protection
The hybrid cloud is at the centerpiece of digital transformation. Today, more than 90 percent of enterprises...
Take Control of Security Operations with Consolidation and XDR
The constantly evolving cyber threat landscape and steady stream of cybersecurity technologies designed...
Economist: Signals and Noise: The New Normal in Cybersecurity
Cybersecurity is a top priority for Boards and the C-Suite. Strengthen your security posture with executive...
Isolated Castles: Incident Response in the New Work From Home Economy
Since the shift to work from home, there's been a paradigm shift in the IT and security industry. The...
Untangling the Web of Cloud Security Threats
Changing technologies and evolving threats make IT security more challenging. Business units are adopting...
From Seismic Disruption to a New Era of Success
No one could have foreseen the terrible impact of the COVID-19 outbreak on humankind. In business too,...
Sign up for FinTech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.