Operation Inbox: Stopping the Next Generation of Email Cyberattacks

Between 75% and 90% of targeted cyberattacks start with an email. Targeting email is increasingly becoming the tactic of choice among hackers Targeting email is...

The email threat: Key concerns of EMEA IT stakeholders and the...

Despite the variety of sophisticated email-borne threats from ransomware to phishing and everything in between, IT security leaders must also consider their organisation’s weakest...

Selecting an enterprise mobile application development platform

The huge rise in demand for enterprise apps is only matched by the huge rise in cyber security risks. Find out how to minimise these risks within your enterprise.

Ransomware: Four Ways to Protect Data Now

How to minimise ransomware threats and recover quickly from a breach.

The Past, Present and Future of Malware (and malware protection)

How long do you think malware has been around for? The exact date is of some debate among historians. From a physical (virtual?) perspective,...

Eight Good Reasons to Bring Finance and Human Capital Management Together

For senior industry leaders Most businesses treat finance and Human Capital Management (HCM) as different domains, but this separation creates a lot of problems. Combining finance...

Advanced Threat Protection

This whitepaper uncovers the comprehensive, reliable protection against attacks like ransomware and advanced persistent threats that organisations face The polymorphic nature of modern cyber threats...

Case Study: How a leading transport firm streamlined their WAN infrastructure

This case study is for senior IT leaders, showing how one of Europe’s leading transport and logistics companies connected all remote branches using Barracuda’s...

Can you Risk Connectivity Outage?

How to ensure high quality connectivity and high bandwidth while controlling costs: Bridging the gap between real world buyer needs and mainstream firewall industry...