READ TIME: 4 minutes
Find out how working from home (WFH) has brought about new security threats, and made old ones more effective.
6 Steps to Secure Your IT Supply Chain
WHO IT'S FOR: This paper is written for any stakeholder concerned about their susceptibility to attack from the vector of the suppliers within their environment. This could be senior leaders concerned about mitigating risk, or IT management looking for practical advice to implement controls.
The Collaborative Approach to Cybersecurity
WHO IT'S FOR: IT leaders who may have thought they “had to do it alone” when it came to cybersecurity. Cybersecurity professionals who are a “one-person team”... Business leaders who can’t understand why these siloes haven’t secured the organization, yet.Or, anybody considering external help with
Elevating Incident Response Readiness
WHO IT'S FOR: Midsize Enterprise IT leaders who want to improve their incident readiness through advanced preparation, planning and practice. Alternatively, if you are an SMB IT leader that is facing an incident, or who wants to prepare for one in advance, we have a version of this white paper
Foundations for Incident Response Readiness
WHO IT'S FOR: SMB IT leaders that are presently facing an incident, or who want to prepare for one in advance. As well as response team members, helpdesk, and IT managers who stand to benefit from practical templates and tactical advice pertaining to cybersecurity incidents. Alternatively, if
2022 Cybersecurity Predictions
WHO IT’S FOR: This whitepaper is written for anybody interested in the changes we can expect to cybersecurity in 2022, as well as those IT Leaders tasked with preparing their organizations for it. It includes a “how to prepare” section for each of our predictions, to better enable your IT or