Operation Inbox: Stopping the next generation of email cyber attacks

Between 75% and 90% of targeted cyber attacks start with an email. Targeting email is increasingly becoming the tactic of choice among hackers Targeting email...

Case study: How a leading transport firm streamlined their WAN infrastructure

This case study is for senior IT leaders, showing how one of Europe’s leading transport and logistics companies connected all remote branches using Barracuda’s...

Advanced Threat Protection

This whitepaper uncovers the comprehensive, reliable protection against attacks like ransomware and advanced persistent threats that organisations face The polymorphic nature of modern cyber threats...

Can you risk connectivity outage?

How to ensure high quality connectivity and high bandwidth while controlling costs: Bridging the gap between real world buyer needs and mainstream firewall industry...

Evolution of spear phishing

Evolution of Spear Phishing by Barracuda explores steps to identifying, preventing and responding to potentially devastating spear phishing attacks. Spear phishing is the latest evolution...

The email threat: Key concerns of EMEA IT stakeholders and the...

Despite the variety of sophisticated email-borne threats from ransomware to phishing and everything in between, IT security leaders must also consider their organisation’s weakest...

Best practices for protecting against phishing, ransomware and email fraud

Best Practices for Protecting Against Phishing, Ransomware and Email Fraud explores the difficult times that security teams and the organisations they support are facing...

Firewalls: From Next Generation to Cloud Generation

Security is evolving to go beyond the perimeter, to where organisations need advanced protection in real-time. This report highlights everything you need to know about next-generation firewall technologies that protect against threats which can bypass traditional firewall security.

Firewalls in the cloud: The new next-generation

Your cloud security challenges and concerns answered by the experts Traditional network and security technologies don’t translate well to a cloud environment. Today, as enterprises...