Please turn on your JavaScript for this page to function normally.
Info-Tech Research Group

How a hub and spoke model can future-proof your cloud deployment
Cloud adoption among organizations has increased dramatically over the past few years, both in the range of services used and the extent to which they are employed, according …

Trends that impact on organizations’ 2023 security priorities
Although ransomware campaigns declined quarter over quarter in 2022, primarily due to the collapse of more experienced cybercriminal groups, IT leaders still consider them to …

Data backup is no longer just about operational fallback
Data backup has traditionally been in the operational domain of IT, while security teams have been responsible for threats to data from attacks. As these attacks have become …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility