Quantcast
Channel: Reg Whitepapers
Browsing all 1703 articles
Browse latest View live

The Total Economic Impact™ Of Cloudflare’s Connectivity Cloud

Enterprises are seeing increased complexity with distributed employees, distributed applications, and myriad siloed networks and vendors. With this growing complexity comes a more dangerous threat...

View Article


The Buyer’s Guide to SASE Use Cases

Many organizations today understand the promise of adopting a SASE architecture, yet there is no “one size fits all” roadmap to get there. There are a broad spectrum of security and network...

View Article


Streamline data compliance with composable controls

In today’s digital world, data is everywhere. Organizations are struggling to keep up with the regulatory environment by securing data and ensuring sovereignty.

View Article

Information Security and Compliance Future Trends 2024

No one can predict when a successful cyber attack will occur, and that’s why endpoint security, security information event management (SIEM), and extended detection and response (XDR) are all closely...

View Article

Reclaim Your Time

Square and American Express commissioned a report to uncover the biggest challenges hospitality businesses face and how to address them. Surveying 162 business owners, the found that 94% are looking to...

View Article


Designing Cloud Teams: How to Build a Better Cloud Center of Excellence

Download the guide and discover:Why team size matters and why smaller is often betterWhat the differences between projects and products are and how to measure success for eachHow to employ platform...

View Article

Measuring the business value of your cloud transformation

This report highlights:Key insights from Google Cloud’s customer partnerships, pinpointing the tangible business value derived from cloud transformations.Real-world examples of how a FinOps approach...

View Article

The Defender's Advantage: A guide to activating cyber defense

When organizations are faced with adversaries in their own environment, they have a fundamental ""defender's advantage.""Security teams capitalize on this advantage if they can effectively control the...

View Article


Explore AI-powered security from Google Cloud

As cybersecurity threats evolve, AI and automation can empower defenders to stay ahead. That’s why Google Cloud is introducing new AI-powered innovations across our security portfolio to help...

View Article


Stay Ahead of the Latest Threats with Intelligence-Driven Security Operations

The concept of applied threat intelligence can help combat these common issues. Read this whitepaper to explore:Key components of applied threat intelligence, including continuous analysis of data,...

View Article

Accelerating generative AI-driven transformation with databases

Our new guide shows you how and why operational databases will help you:Deliver hyper-personalized customer experiences that drive engagementBoost productivity for developers, administrators, and your...

View Article

Insulate Your Business with Auth0 by Okta

Like a Frank Green insulates your beverages, we help you insulate your business against evolving cyber threats.Why Auth0 by Okta?Organisations today are looking to ship products and innovations...

View Article

Data Intelligence with Databricks on Google Cloud

The Databricks Data Intelligence Platform allows your entire organization to use data and AI. It’s built on the lakehouse – a unified system to query and manage all data across the enterprise – to...

View Article


Everywhere Security

The pursuit of innovation creates risks that ripple throughout an organization. New web apps, APIs, and integrations create new attack surfaces, as does embracing cloud-first, remote-friendly corporate...

View Article

Unified risk posture: A CISO’s guide to reducing risk and complexity

As attack surfaces continue to expand, managing cyber risk is becoming too complex: Security teams are slowed down by too many siloed tools, too many signals, and too much manual effort to assess,...

View Article


Threats against people, apps, and infrastructure

Take a deep look at the most important trends shaping the cyber threat landscape today, including AI, vulnerability exploitation, DDoS attacks, phishing, and Zero Trust.Based on the analysis of...

View Article

Protect Your Attack Surface

Every Internet-connected resource creates new entry points and vectors for attackers to exploit. Multi-cloud and hybrid IT approaches also dramatically increase your attack surface. Yet, point...

View Article


Transforming Enterprise IT with Future-proof AI Storage

View Article

Futureproofing AI: Preparing for Tomorrow Without a Crystal Ball

Join Savas Nicolaides as he welcomes Stephen Bailey, Consulting Field Solutions Architect, and JB Thomas, Principal Field Solutions Architect, to a shorter (20-30 min), engaging format of our Coffee...

View Article

Magnet Virtual Summit 2025: register now for the virtual DFIR event of the year!

Magnet Virtual Summit 2025 is a great chance to learn about the latest research and findings in everything DFIR. We’ll have over 50 presentations from experts in the public safety and enterprise...

View Article
Browsing all 1703 articles
Browse latest View live