Whitepaper-archief

Laatste onderwerpen:

Zero Trust Network Access: Barracuda's ultieme gids

Het dreigingslandschap van cybercriminaliteit is verzadigder dan ooit, met aanvallen die steeds geraffineerder worden en succesvolle aanvallen op organisaties in elke sector. Ook de financiële schade voor deze bedrijven laat...

Rapport bekijken

Zero Trust Network Access: Barracuda's ultimate guide

The cybercrime threat landscape is more saturated than ever, with attacks growing in sophistication and successfully hitting organisations in every sector. What’s also growing is the financial damage to these businesses: IBM S...

Rapport bekijken

The state of Office 365 backup

There’s an explosion of Microsoft Office 365 data and a pressing need to protect it. Office 365 is seeing tremendous growth, particularly with the current world of remote workforces. According to Thexyz blog, in March 2020, th...

Rapport bekijken

Spear Phishing: Top Threats and Trends

Cybercriminals are constantly refining their tactics and making their attacks more complicated and difficult to detect. In this in-depth report, Barracuda researchers share their insights on the most recent trends in social eng...

E-boek bekijken

Betaal geen ransom

Eenvoudig gezegd is ransomware kwaadaardige software die uw gegevens versleutelt of er op een andere manier voor zorgt dat u geen toegang meer hebt tot uw eigen systemen. Vervolgens eisen de criminelen losgeld in ruil voor de d...

E-boek bekijken

Don’t pay the ransom

In simple terms, ransomware is malicious software that either encrypts your data or otherwise stops you from accessing your own systems. The criminals then demand a ransom in exchange for the decryption key, although, of course...

E-boek bekijken

The new ABCs of application security

Applications are the building blocks of how digital businesses work and how they engage with their end users and customers. The move to remote work in 2020 intensified the importance of web apps, and many organizations have had...

E-boek bekijken

The CIO Roadmap to Hybrid and Multi-Cloud

While cloud has become a key driver of business expansion and operational efficiency, business and IT leaders still struggle to understand how to transform their organizations into cloud-driven and cloud-optimized enterprises. ...

Whitepaper bekijken

3 Things That Slow Your Time to Remediation

Today’s average security team has to manually collect findings from 5 to 10 disparate scanning tools and try to deduplicate and prioritize them. Since the security team cannot fix these risks, it has to act as a “middleman” an...

E-boek bekijken

451 - The Value of Streamlining Cloud Native Operations & Optimizing Public Cloud Environments

A Pathfinder paper navigates decision-makers through the issues surrounding a specific technology or business case, explores the business value of adoption, and recommends the range of considerations and concrete next steps in ...

Rapport bekijken
Registreer u voor onze nieuwsbrief
Het belangrijkste nieuws gratis via e-mail