Archivio whitepaper

Argomenti più recenti:

Post-Covid-19: Digital Transformation and OT Cyber Security in Asia

Digital transformation has been dramatically accelerated by the Covid-19 pandemic, requiring businesses and operations to quickly set up infrastructures to maintain business continuity. And no part of the network has been impac...

Visualizza whitepaper

Causes and Consequences of IT and OT Convergence

Until recently, operational technology (OT) and information technology (IT) had completely different purposes and were on separate, independent networks. But digital transformation (DX) is forcing the merger of the networks to ...

Visualizza whitepaper

Securely Enable Industrial Digital Transformation

The benefits of digital transformation (DX) have driven organizations to adopt new technologies that take time to transition into the scope of security operations. Industrial organizations with substantial operational technolog...

Visualizza whitepaper

Advanced Threat Protection for Industrial Control Systems and Operational Technology

Nine out of ten OT organizations experienced at least one system intrusion in the past year. Malware and phishing are the most common intrusions.

Visualizza whitepaper

Ready, Set, Transform: Modernise Your Database on AWS

With the ever-increasing volumes of data companies are collecting today, most are trying to harness and use it to power their decision-making processes. But much of the data is still improperly stored, hard to access, and impos...

Visualizza eBook

2022 State of the Phish: Un'esplorazione approfondita della consapevolezza, della vulnerabilità e della resilienza degli utenti

L'anno scorso, la nostra presentazione era intitolata "Un anno come nessun altro". Avremmo potuto benissimo usare questo titolo per descrivere il 2021. Quest'anno ha spinto molte aziende a immaginare una nuova normalità per la ...

Visualizza eBook

State of the Phish 2022: An in depth exploration of user awareness, vulnerability and resilience

Last year, we titled our introduction “A Year Like No Other.” We could easily have repeated that heading to describe 2021. The year has left many organisations contemplating what “normal” will mean for their workforces going fo...

Visualizza eBook

Turning the Tables

Even before this decade’s pandemic-fueled migration to remote and hybrid work, cyber criminals had shifted their focus away from infrastructure and toward people. More than ever, attacks seek to exploit human vulnerabilities, n...

Visualizza eBook

Da vulnerabilità a solida linea di difesa

Anche prima dell’adozione diffusa del telelavoro e di modelli di lavoro ibrido, i criminali informatici avevano già spostato la loro attenzione dalle infrastrutture alle persone. Più che mai, gli attacchi cercano di sfruttare l...

Visualizza eBook

Oltre la formazione di sensibilizzazione

La maggior parte dei responsabili della sicurezza informatica ormai sa che i dipendenti rappresentano la principale superficie d’attacco della loro azienda. La diffusione del lavoro da remoto e ibrido, unito alla migrazione ver...

Visualizza eBook
Registrati alla newsletter
Le principali notizie, gratuitamente via mail