Webinar: Best practices for teleworkers at scale
By Fortinet | Jan 14, 2021 | Sponsored, Video, Whitepapers | 0
Maximize the ROI of detection and response
By Palo Alto Networks | Jan 14, 2021 | Sponsored, Whitepapers | 0
Healthcare organization addresses cloud access man...
By Thales | Dec 4, 2020 | Sponsored, Whitepapers | 0
Webinar: Best practices for critical event management
By BlackBerry | Jan 18, 2021 | Sponsored, Video, Whitepapers
Join this on-demand presentation to learn how organizations are leveraging AtHoc to plan, prepare and respond to critical events.
Read MoreWebinar: Best practices for teleworkers at scale
By Fortinet | Jan 14, 2021 | Sponsored, Video, Whitepapers
Learn how your organization could more effectively provision network bandwidth, support and security for your growing remote workforce.
Read MoreMaximize the ROI of detection and response
By Palo Alto Networks | Jan 14, 2021 | Sponsored, Whitepapers
Cut costs by 44% by consolidating tools and streamlining operations for cyber-threat detection and response.
Read MoreHealthcare organization addresses cloud access management challenges
By Thales | Dec 4, 2020 | Sponsored, Whitepapers
Healthcare and recruitment data are some of the most sensitive information, and need special protection when exchanged and managed in the cloud.
Read MoreModern application development security
By Synopsys | Dec 2, 2020 | Sponsored, Whitepapers
Highlights of ESG’s latest study on AppDev security trends.
Read MoreSecure remote access for your workforce at scale
By Fortinet | Nov 20, 2020 | Sponsored, Whitepapers
Supporting employees working remotely is essential to ensuring both business continuity and security
Read MoreKey considerations for implementing secure telework at scale
By Fortinet | Nov 20, 2020 | Sponsored, Whitepapers
Identifying the security risks and advanced requirements of a remote workforce
Read MoreSolving secure telework requirements for ‘super users’
By Fortinet | Nov 20, 2020 | Sponsored, Whitepapers
How secure SD-WAN enables critical access and super user experience
Read MoreDeliver security and performance for the most demanding remote workers
By Fortinet | Nov 20, 2020 | Sponsored, Whitepapers
Solutions that provide telework security and application performance for the ‘super user’
Read MoreThe New Normal: Working from home and extending perimeter defenses
By Pulse Secure | Nov 12, 2020 | Newsletter, Opinions, Sponsored
Almost a year into the COVID-19 pandemic, organizations are still challenged with supporting increased bandwidth and a new kind of cyber hygiene.
Read MoreThe pivotal role of HR in cybersecurity
By Sumit Bansal, Managing Director, ASEAN, Sophos | Nov 11, 2020 | Newsletter, Opinions, Sponsored
The human element continues to be one of the weakest links when it comes to data breaches.
Read MoreThe ultimate guide to CSPM
By Horangi | Oct 21, 2020 | Sponsored, Whitepapers
What is Cloud Security Posture Management (CSPM), and how do you choose the right one for your organization?
Read MoreWallex ups its security posture
By Horangi | Oct 21, 2020 | Sponsored, Whitepapers
To fulfil its mission of offering financial solutions to help SMEs focus on growing their business, Wallex needed a secure cloud infrastructure while complying with stringent financial regulations.
Read MoreHow Zave built cyber resilience, protect customer data on AWS
By Horangi | Oct 21, 2020 | Sponsored, Whitepapers
To comply with stringent cybersecurity standards and protect sensitive corporate customer data, Zave relies on a Cloud Security Posture Management solution
Read MoreGnowbe elevates platform security for learning partners and end-users
By Horangi | Oct 21, 2020 | Sponsored, Whitepapers
Mobile-first learning library platform turned to Horangi for a comprehensive yet cost-effective cybersecurity solution.
Read More6 IT security risks in a perimeterless world
By CyberArk | Oct 12, 2020 | Sponsored, Whitepapers
Your organization’s sensitive information is everywhere – on mobile devices, in the cloud and behind your firewall. So where is your secure perimeter?
Read More3 tips for choosing a next-generation firewall for small businesses
By Cisco | Oct 6, 2020 | Sponsored, Tips, Whitepapers
Threats have evolved. Businesses of every size are at risk. Has your security posture evolved to meet the challenges?
Read More5 tips for choosing a next-generation firewall
By Cisco | Oct 6, 2020 | Sponsored, Tips, Whitepapers
Ready to invest in a next-generation firewall (NGFW)? Here’s a checklist of 5 things it should deliver…
Read MoreAre we ready for the next big breach?
By Cisco | Oct 6, 2020 | Case Study, Sponsored
How organizations across various industries prevent breaches, get deep visibility to detect and stop threats fast, and automate their network and security operations.
Read MoreTop 10 considerations when choosing a modern single sign-on solution
By CyberArk | Oct 2, 2020 | Sponsored, Tips, Whitepapers
Not all single sign-on (SSO) solutions are created equal, and choosing the right one can be a challenging process. Over-reliance on passwords negatively impacts end-user productivity.
Read More

Whitepapers
Webinar: Best practices for critical event management
Join this on-demand presentation to learn how organizations are leveraging AtHoc to plan, prepare and …Download WhitepaperWebinar: Best practices for teleworkers at scale
Learn how your organization could more effectively provision network bandwidth, support and security for your …Download WhitepaperMaximize the ROI of detection and response
Cut costs by 44% by consolidating tools and streamlining operations for cyber-threat detection and response.Download WhitepaperHealthcare organization addresses cloud access management challenges
Healthcare and recruitment data are some of the most sensitive information, and need special protection …Download Whitepaper
More News
Case Studies
Are we ready for the next big breach?
How organizations across various industries prevent breaches, get deep visibility to detect and stop threats …Read moreIdaptive reduces complexity, increases security for NZ agricultural organization
Challenge: find a single sign-on solution to reduce complexity, minimize calls for password assistance, increase …Read moreEmail Security Threat Report 2020
Email and collaboration platforms are the connective tissue of most businesses and organizations, where information …Read moreLeading Malaysian developer zeroes in on threats with LogRhythm
Full visibility and intelligent detection eliminate cybersecurity blind spots and reduce response time for UDA. …Read more