Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Publications

Broken China?

This white paper examines China's economic situation post-COVID-19, analysing if the recovery has stalled and the long-term implications for the world's second-largest economy. It looks at key economic and structural weaknesses, including declining factory activity, falling consumer prices, a struggling property sector, rising unemployment, and demographic challenges.

Technology-Driven VMware to OpenStack Migration: A Comprehensive Guide

The Broadcom acquisition of VMware has triggered a strategic shift for cloud deployments. Organizations are increasingly concerned about vendor lock-in and potential cost increases, prompting them to explore alternative solutions. This report analyzes the opportunity for migrating workloads from VMware to OpenStack, outlining key decision points and best practices for a successful transition.

Chapter One: The State of Vulnerability Management

Vulnerability exploitation is involved in over half of breaches, making it a huge risk to organizations. And the problem only continues to balloon year over year... both in the speed at which attackers are capitalizing on exploited vulnerabilities, and in the way that technology and assets outgrow most organization's current vulnerability management programs. In this series, we're going to be breaking down how vulnerability management has grown and evolved over time, plus how to modernize your program using things like risk-based vulnerability management.

Cryptocurrency Threat Landscape Report - Q3 2023

In today's volatile financial landscape, cryptocurrencies are both an asset and a liability. While they offer unprecedented freedom and flexibility, they also expose users to a myriad of threats ranging from regulatory shifts to malicious attacks. The landscape is shifting rapidly, and staying informed is crucial.