Research Library

Powered by

All Research Sponsored By:Barracuda

  • 2023 ransomware insights

    The prevalence and importance of modern data has changed cybercrime. No matter the size or industry, every organization now poses a potential target for ransomware hackers. This report explores the prevalence and dangers of ransomware attacks, analyzing 5 key trends that are shaping the global ransomware landscape. Read on to learn more.

  • Backup best practice transforms data management for security provider

    While MSS Security’s business has to do with physical security, cybersecurity is critical for protecting the data they utilize while securing clients. As their business grew, they realized that their digital security wasn’t sufficient, and partnered with Barracuda in order to overhaul their cloud backup. Download the case study now to learn more.

  • The 2023 Email Security Trends

    As the most prominent form of digital communication, email presents hackers with an avenue to reach anyone, anywhere, at any time. In this webcast experts from Barracuda leverage research from their recent threat report to provide insight into the email security landscape. Watch now to discover more.

  • The risk of ransomware to Microsoft 365 data

    While it’s clear that ransomware has a financial effect on businesses that are compromised, what may be an even bigger concern is the potential of data loss.This white paper looks at how data backups for Microsoft 365 can not only prevent financial disaster but can ensure that precious data isn’t lost. Read on to learn more.

  • Extending Zero Trust to your SaaS applications

    Today, businesses operate in a state of flexibility: employees work from home or from the office, on unmanaged or managed devices. Though this flexibility reaps myriad benefits, it also makes the process of securing access to applications, SaaS or otherwise, increasingly complex. View this webcast to unlock guidance on overcoming this challenge.

  • Hardening Microsoft 365 against new account takeover attacks

    Given the widespread nature of Microsoft 365 account takeover attacks, your organization, like every organization, is pressed to bolster your defenses against this rampant threat. But how can you do so? Watch this webcast to unlock an account-takeover masterclass.

  • Cyber Insurance: Why it pays to be prepared

    Ransomware attacks are up 200% to 400% year over year, according to a recent report by Barracuda. Should you consider cyber insurance to defend your organization against such an increasing threat? To help you determine your answer, watch this webcast for a cyber insurance deep dive.

  • 2023 email security trends

    As email remains a top vector for cyberthreats, IT and security professionals need to stay focused on the evolution of phishing, ransomware, and other security threats.This analyst report looks at 5 cybersecurity best practices that all organizations can put in place to minimize their risk and exposure to cyberthreats. Read on to learn more.

  • Cybersecurity Predictions for 2023 and Beyond

    The cybersecurity landscape is constantly changing, and if you aren’t preparing for the future, you are at risk of being blindsided by the next big threat. In this webcast, Barracuda experts sit down to discuss cybersecurity, beginning by looking back at recent trends, and finishing with a forecast into the future. Watch now to learn more.

  • A look back at high-impact application vulnerabilities from 2022

    In the modern digital world, a vulnerability found in a single line of code can lead to a global security crisis due to the prevalence of third-party code. This webcast reviews the year in application vulnerabilities, breaking down the most prevalent vulnerabilities, explaining what led to them, and how they were overcome. Watch now to learn more.

  • The State of Cyber Resilience in Australia 2022

    Recent years have seen an increase in the level of threats facing organizations. This webcast analyzes at the state of cyber resiliency in Australia, specifically looking at what cybersecurity methodologies and platforms were ignored, sides-stepped, or downplayed in recent years, resulting in numerous threats. Watch the webinar now to learn more.

  • The State of Cyber Resilience in Australia 2022

    Security is no longer enough. The modern threat landscape is so advanced that organizations can no longer simply deploy a defense, but now need to build resiliency in the face of attacks. This report looks at the cyber resiliency market, analyzing how organizations are building their own resiliency posture. Read now to discover more.

  • The state of industrial security in 2022

    This report takes an in-depth look at IIoT/OT security projects, trends, challenges, security incidents, and how to tackle cybersecurity risks in industrial environments. Browse your copy to view the detailed research results for yourself and benchmark your industrial security approach against that of your peers.

  • The state of network security in 2021

    Businesses are increasingly investing in SASE solutions to defeat attacks and protect their networks while supporting a hybrid work model. This research report looks at cloud adoption, working from home, security concerns and a variety of challenges related to network security. Read on to discover all 26 research findings and analytical insights.


    Ransomware attackers are increasingly employing more sophisticated attacks and defeating existing defenses. Download this comprehensive checklist to develop an effective protection plan for your organization to protect your email, secure your applications, back up your data and more.

  • Ransomware: Why O365 backup is key for your survival strategy

    Ransomware is still one of the top organizational threats of 2021. Access this webinar to learn about protecting against ransomware and other threats and leveraging emerging cloud-backup strategies and solutions to secure your Office 365 data.

  • The state of Office 365 backup

    Finding that Microsoft’s built-in tools are basic, and restoration with native tools can be difficult and time consuming? Luckily, this report takes a look at the concerns and preferences IT professionals have about Office 365, data security, backup and recovery, software-as-a-service (SaaS) solutions, and related topics.

  • The state of application security in 2021

    Has your organization suffered a security breach as a direct result of a vulnerability in one of its applications? On average, organizations were successfully breached twice in the past 12 months as a direct result of an application vulnerability. Access this report to gather all the facts about the state of application security in 2021.

  • A Practical Guide To A Zero Trust Implementation

    Zero Trust architectures are growing in popularity across most organizations – but security leaders sometimes feel daunted by the changes required to embrace Zero Trust. Read this Forrester e-guide to unlock exclusive expertise regarding designing, implementing and managing a Zero Trust architecture.

  • Spear Phishing: Top Threats and Trends Vol. 5

    As their speedy exploitation of fears around the COVID-19 pandemic show, cybercriminals adapt quickly to current events and new tactics. This in-depth report takes a look at the evolving trends in spear-phishing and the new ways attackers are tricking their victims – read on unlock this exclusive insight.

  • Ransomware Threat Spotlight

    Another unfortunate consequence of 2020 was the apparent rise of ransomware threats, especially those targeting remote workers. This webinar provides a look back at the top ransomware trends of 2020, highlighting key tactics, common vulnerabilities and more – watch now to get started.

  • Leading private hospital consolidates email protection to secure VIP guests’ data “Crown Jewels”

    Healthcare is one of the most frequently targeted verticals and patient data has grown in value to cybercriminals. This case study follows how Richard Andrews, Head of IT at King Edward VII’s hospital in London, was able to implement email security for his most vulnerable patients – including members of the Royal Family.

  • 5 steps to secure home devices & improve productivity for remote work

    Due to the pandemic, remote work became an essential part of a modern enterprise. But for remote work and employees to thrive, they need fast and secure access to data. Read on to discover 5 steps organizations can take to further secure their remote workers, without sacrificing productivity.

  • Barracuda CloudGen Access

    Remote work is here to stay, and cloud migrations are accelerating. This level of risk means organizations must leverage secure access, verifying that only the right people with the right devices and the right permissions have access to company data, apps & infrastructure. In this data sheet, examine Barracuda’s CloudGen Access, a zero-trust tool.

  • Spear Phishing vol4: Impersonations are increasingly more common, sophisticated and targeted.

    Spear phishing, alongside other impersonation attacks, are on the rise, and new tactics are making it more difficult to differentiate between an impersonation attempt and a genuine message. Read on to discover the top 3 spear phishing impersonation attacks to keep an eye on.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2023 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.