2019 Security Technology Spend Insights Report
This paper discusses the top five Cybersecurity Technology Buying Trends.
What A Hacker Sees: Top 20 CIS Critical Security Controls
This paper discusses the top 20 Center for Internet Security (CIS) Critical Security Controls (CSC) come into play, providing organizations with 20 key controls that they can implement to mitigate some of the threats they are facing. (more available)
The Five Steps To Managing Third Party Risk
This white paper tackles the subject of how outsourced labor can cause cybersecurity risk.