Latest Whitepapers
The Anatomy of an Insider Threat Investigation: A Visual Guide
For decades, perimeter-based security strategies have been the starting point for most cybersecurity...
Adaptive Multi-Factor Authentication
This white paper provides an overview of Okta Adaptive Multi-factor Authentication (MFA). For security...
Ransomware The True Cost to Business
Ransomware continues to dominate the threat landscape in 2022. Organizations are under siege from a wide...
Ransomware Case Studies
Ransomware is a simple name for a complex collection of security threats. Attacks can be short and brutal,...
The 7 Hidden Truths of Cloud Security
Based on extensive, up-to-date knowledge and experience from WithSecure consultants, threat hunters and...
Drive Real Behaviour Change
Cybersecurity awareness training is one of the most important things you can do to secure your organisation....
Architecting the Zero Trust Enterprise
Zero Trust is a strategic approach to cybersecurity that secures an organization by eliminating implicit...
What Makes Real Threat Intelligence
First popularized in terminology several years ago, threat intelligence means many things to many people....
Cloud Security Report 2022
Cloud adoption continues to permeate throughout organizations as they embrace agile software development....
Identity Security: An Essential Piece of Your Zero Trust Strategy
Zero Trust is a security framework that aims to enable an organization's digital business while ensuring...
Sophos 2022 Threat Report
Interrelated threats target an interdependent world. We believe that shifting the timescale of attack...
The Complete Guide to Enterprise Ransomware Protection
The SentinelOne Complete Ransomware Guide will help you understand, plan for, respond to and protect...
Sign up for Cyber Security Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.