Enterprise Security
Discover expert analysis on enterprise security with news, features and insights from the team at IT Pro.
-
The complete guide to the NIST cybersecurity frameworkWhitepaper Find out how the NIST Cybersecurity framework is evolving
By ITPro Published
Whitepaper -
Aligning to NIS2 cybersecurity risk-management obligations in the EUWebinar Aligning to NIS2 cybersecurity risk-management obligations in the EU
By ITPro Published
Webinar -
Are you prepared for the next attack? The state of application security in 2024Webinar Aligning to NIS2 cybersecurity risk-management obligations in the EU
By ITPro Published
Webinar -
Are you prepared for the next attack? The state of application security in 2024Webinar Aligning to NIS2 cybersecurity risk-management obligations in the EU
By ITPro Published
Webinar -
Aligning to NIS2 cybersecurity risk-management obligations in the EUWebinar Aligning to NIS2 cybersecurity risk-management obligations in the EU
By ITPro Published
Webinar -
Patch management vs vulnerability managementIn-depth What exactly is patch management, and why should IT pros sit up and take notice of doing it properly?
By Keumars Afifi-Sabet Last updated
In-depth -
The economics of penetration testing for web application securitywhitepaper Get the most value from your security solution
By ITPro Published
whitepaper -
How to extend zero trust to your cloud workloadsWhitepaper Implement zero trust-based security across your entire ecosystem
By ITPro Published
Whitepaper -
Four requirements for a zero trust branchWhitepaper Effectively navigate the complex and ever-changing demands of security and network connectivity
By ITPro Published
Whitepaper -
ThreatLabz 2023 Phishing ReportWhitepaper Realize the tactics used in phishing attacks and prevent costly data breaches
By ITPro Published
Whitepaper -
ThreatLabz Report: The state of encrypted attacksWhitepaper What's hiding in your web traffic?
By ITPro Published
Whitepaper -
The threat prevention buyer's guideWhitepaper Find the best advanced and file-based threat protection solution for you
By ITPro Published
Whitepaper