Insights

Articles, opinions and other ITHQ content

All blog posts

Category
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Cyber Resilence
6 Reasons Why Embracing DORA is a Smart Move for All Businesses

David Thomas, Head of Cyber Resilience at ITHQ, shares why DORA doesn't have to be exclusive to the financial sector

Read On
Hybrid Cloud
Why being resilient does not mean, 'never being breached'

Assume you have already been breached, embrace the inevitable and you're on the road to resilience.

Read On
Cyber Security
SentinelOne vs. Carbon Black: Features, Pricing, and Independent Testing Results

SentinelOne vs. Carbon Black: Features, Pricing, and Independent Testing Results

Read On
Cyber Security
SentinelOne vs. CrowdStrike: Features, Pricing, and Independent Testing Insights

SentinelOne vs. CrowdStrike: Features, Pricing, and Independent Testing Insights

Read On
Cyber Security
SentinelOne vs. Microsoft Defender XDR and Defender for Cloud

SentinelOne vs. Microsoft Defender XDR and Defender for Cloud: pros and cons

Read On
Cyber Security
Unpacking the 2023 FBI IC3 Report: Beyond the Numbers

Unpacking the latest IC3 report from the FBI: record losses, escalating threats and over 800k complaints

Read On
Cyber Security
SentinelOne vs. Cybereason: A Detailed Comparison

SentinelOne vs. Cybereason: a Detailed Comparison between two popular cybersecurity solutions

Read On
Cyber Resilence
Cyber Recovery vs. Disaster Recovery

Cyber Recovery vs. Disaster Recovery, the importance of immutable backups and categorised data

Read On
Cyber Security
Taking Control of Supply Chain Security

A key part of security controls and frameworks, it's time to take your supply chain security seriously

Read On
Supply Chain Security
Attack Surface Management: a cyber resilience framework

Attack Surface Management is an ongoing process. Rely on static network diagrams and assumptions at your peril

Read On
Cyber Resilence
Continuous Vulnerability Assessment vs Annual Pen Test

With increasingly sophisticated vulnerability management technology available, is there still a reason for the annual pen test?

Read On
Cyber Security
IoT: Never assume, never trust, always verify

The simple rule, as the Internet of Things expands, is verify everything and trust nothing

Read On
Cyber Security
Fortinet Firewalls vs. Palo Alto Firewalls: A Comparative Analysis

Fortinet Firewalls vs. Palo Alto Firewalls: comparing two cyber security giants

Read On
Cyber Resilence
What is your cyber attack game plan?

What is your cyber attack game plan? Get your scenarios mapped, strategies drafted and roles assigned now

Read On
Zero Trust
The Importance of Zero Trust

A firewall is no protection if the threat is already on the inside. Assume a breach has already occurred ...

Read On

Want to know more? Let's talk.

Contact Us