Latest Whitepapers
PhishBusters Survey: Perception vs. Reality of Phishing Attacks
Cofense conducted a survey to examine the general public's perceptions of phishing attacks, including...
BlackBerry Cyber Suite
The challenge of securing and protecting data and endpoints is not a new requirement, but today it is...
How to Leverage O365 for a Zero Trust Strategy
Enterprise adoption of Microsoft Office 365 (O365) skyrocketed to over 258,000,000 users in 2020 and...
5 Tips for Managing Third-Party Risk
Across industries and around the world, executives remain preoccupied with digital transformation. According...
What Makes Real Threat Intelligence
First popularized in terminology several years ago, threat intelligence means many things to many people....
Why Security Needs An Application-Centric Lens
An application-centric view of security should be based on four critical security capabilities. We discuss...
Redefining Data Loss Prevention (DLP)
Data doesn't move itself. People—whether they are negligent, compromised or malicious—move data in...
2021 Technology Industry Cyber Threat Landscape Report
The technology industry is a top target for both cybercriminals and state-sponsored cyber espionage groups....
First steps to data provisioning maturity
An organization's deepest insights are often derived from sensitive data. Responsible organizations know...
Sign up for Cyber Security Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.