Putting a spotlight on cyber security
An examination of the current cyber security landscape
 
 
  
Times of crisis are when enterprises are at their most vulnerable. That’s why, in light of the current geopolitical risks and COVID-19 pandemic, cyber security is jumping to the top of business leaders’ agendas. With the vast majority of employees working remotely, operations are one breach away from grinding to halt.
This whitepaper explores the current cyber security landscape, providing context, identifying the main threats and vulnerabilities, and examining best practices to make sure you get your cyber security right.
Download it now to hear from the experts.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
- 
 Google says reports of a 'huge' Gmail breach affecting millions of users are false, again Google says reports of a 'huge' Gmail breach affecting millions of users are false, againNews Reports of a major Gmail affecting millions of users have been flooding the web this week – Google says they're "false" and you've nothing to worry about. 
- 
 Document management systems (DMS) in the AI era: How to choose the right solution to create a trusted foundation for your business Document management systems (DMS) in the AI era: How to choose the right solution to create a trusted foundation for your businessSupported In the AI era, documents are no longer just records — they’re strategic assets. A modern DMS provides the secure, intelligent foundation firms need to harness AI, ensure compliance, and build lasting digital confidence 
- 
 ‘The worst thing an employee could do’: Workers are covering up cyber attacks for fear of reprisal – here’s why that’s a huge problem ‘The worst thing an employee could do’: Workers are covering up cyber attacks for fear of reprisal – here’s why that’s a huge problemNews More than one-third of office workers say they wouldn’t tell their cybersecurity team if they thought they had been the victim of a cyber attack. 
- 
 "Thinly spread": Questions raised over UK government’s latest cyber funding scheme "Thinly spread": Questions raised over UK government’s latest cyber funding schemeThe funding will go towards bolstering cyber skills, though some industry experts have questioned the size of the price tag 
- 
 Modern enterprise cybersecurity Modern enterprise cybersecuritywhitepaper Cultivating resilience with reduced detection and response times 
- 
 IDC InfoBrief: How CIOs can achieve the promised benefits of sustainability IDC InfoBrief: How CIOs can achieve the promised benefits of sustainabilitywhitepaper CIOs are facing two conflicting strategic imperatives 
- 
 The complete guide to the NIST cybersecurity framework The complete guide to the NIST cybersecurity frameworkWhitepaper Find out how the NIST Cybersecurity framework is evolving 
- 
 Are you prepared for the next attack? The state of application security in 2024 Are you prepared for the next attack? The state of application security in 2024Webinar Aligning to NIS2 cybersecurity risk-management obligations in the EU 
- 
 The economics of penetration testing for web application security The economics of penetration testing for web application securitywhitepaper Get the most value from your security solution 
- 
 How to extend zero trust to your cloud workloads How to extend zero trust to your cloud workloadsWhitepaper Implement zero trust-based security across your entire ecosystem 
