Insights
Articles, opinions and other ITHQ content
All blog posts

6 Reasons Why Embracing DORA is a Smart Move for All Businesses
David Thomas, Head of Cyber Resilience at ITHQ, shares why DORA doesn't have to be exclusive to the financial sector
Read On
Why being resilient does not mean, 'never being breached'
Assume you have already been breached, embrace the inevitable and you're on the road to resilience.
Read On.webp)
SentinelOne vs. Carbon Black: Features, Pricing, and Independent Testing Results
SentinelOne vs. Carbon Black: Features, Pricing, and Independent Testing Results
Read On.webp)
SentinelOne vs. CrowdStrike: Features, Pricing, and Independent Testing Insights
SentinelOne vs. CrowdStrike: Features, Pricing, and Independent Testing Insights
Read On.webp)
SentinelOne vs. Microsoft Defender XDR and Defender for Cloud
SentinelOne vs. Microsoft Defender XDR and Defender for Cloud: pros and cons
Read On.webp)
Unpacking the 2023 FBI IC3 Report: Beyond the Numbers
Unpacking the latest IC3 report from the FBI: record losses, escalating threats and over 800k complaints
Read On.webp)
SentinelOne vs. Cybereason: A Detailed Comparison
SentinelOne vs. Cybereason: a Detailed Comparison between two popular cybersecurity solutions
Read On.webp)
Cyber Recovery vs. Disaster Recovery
Cyber Recovery vs. Disaster Recovery, the importance of immutable backups and categorised data
Read On.webp)
Taking Control of Supply Chain Security
A key part of security controls and frameworks, it's time to take your supply chain security seriously
Read On.webp)
Attack Surface Management: a cyber resilience framework
Attack Surface Management is an ongoing process. Rely on static network diagrams and assumptions at your peril
Read On.webp)
Continuous Vulnerability Assessment vs Annual Pen Test
With increasingly sophisticated vulnerability management technology available, is there still a reason for the annual pen test?
Read On
IoT: Never assume, never trust, always verify
The simple rule, as the Internet of Things expands, is verify everything and trust nothing
Read On.webp)
Fortinet Firewalls vs. Palo Alto Firewalls: A Comparative Analysis
Fortinet Firewalls vs. Palo Alto Firewalls: comparing two cyber security giants
Read On.webp)
What is your cyber attack game plan?
What is your cyber attack game plan? Get your scenarios mapped, strategies drafted and roles assigned now
Read On.webp)
The Importance of Zero Trust
A firewall is no protection if the threat is already on the inside. Assume a breach has already occurred ...
Read On