Insights
Articles, opinions and other ITHQ content
All blog posts
6 Reasons Why Embracing DORA is a Smart Move for All Businesses
David Thomas, Head of Cyber Resilience at ITHQ, shares why DORA doesn't have to be exclusive to the financial sector
Read OnWhy being resilient does not mean, 'never being breached'
Assume you have already been breached, embrace the inevitable and you're on the road to resilience.
Read OnSentinelOne vs. Carbon Black: Features, Pricing, and Independent Testing Results
SentinelOne vs. Carbon Black: Features, Pricing, and Independent Testing Results
Read OnSentinelOne vs. CrowdStrike: Features, Pricing, and Independent Testing Insights
SentinelOne vs. CrowdStrike: Features, Pricing, and Independent Testing Insights
Read OnSentinelOne vs. Microsoft Defender XDR and Defender for Cloud
SentinelOne vs. Microsoft Defender XDR and Defender for Cloud: pros and cons
Read OnUnpacking the 2023 FBI IC3 Report: Beyond the Numbers
Unpacking the latest IC3 report from the FBI: record losses, escalating threats and over 800k complaints
Read OnSentinelOne vs. Cybereason: A Detailed Comparison
SentinelOne vs. Cybereason: a Detailed Comparison between two popular cybersecurity solutions
Read OnCyber Recovery vs. Disaster Recovery
Cyber Recovery vs. Disaster Recovery, the importance of immutable backups and categorised data
Read OnTaking Control of Supply Chain Security
A key part of security controls and frameworks, it's time to take your supply chain security seriously
Read OnAttack Surface Management: a cyber resilience framework
Attack Surface Management is an ongoing process. Rely on static network diagrams and assumptions at your peril
Read OnContinuous Vulnerability Assessment vs Annual Pen Test
With increasingly sophisticated vulnerability management technology available, is there still a reason for the annual pen test?
Read OnIoT: Never assume, never trust, always verify
The simple rule, as the Internet of Things expands, is verify everything and trust nothing
Read OnFortinet Firewalls vs. Palo Alto Firewalls: A Comparative Analysis
Fortinet Firewalls vs. Palo Alto Firewalls: comparing two cyber security giants
Read OnWhat is your cyber attack game plan?
What is your cyber attack game plan? Get your scenarios mapped, strategies drafted and roles assigned now
Read OnThe Importance of Zero Trust
A firewall is no protection if the threat is already on the inside. Assume a breach has already occurred ...
Read On