Bypassing KPTI Using the Speculative Behavior of the SWAPGS Instruction
In this whitepaper, Bitdefender demonstrate a new type of side-channel attack based on speculative execution of instructions inside the OS kernel.

Ten Best Practices for Protecting Sensitive Content 
These best practices from Accellion provide ten actionable steps you can take to build a holistic defence of the third party workflow threat surface. 

Is your project cracking under pressure?
As your business grows, your computing needs will change. It’s common for established businesses to encounter capacity constraints with on-premises servers, this whitepaper will help you to future proof your business. 

Why you need a video first posture
With the help of Zoom and No Jitter Research, discover how a video first culture could enable your business. 

The Risky Business of Online Collaboration 
CISOs must enable secure online collaboration that balances the protection of sensitive content with the need to share it. All while easing access, preventing breaches, and ensuring privacy. 

Carbon cutting in the datacentre
Cutting emissions cannot be ignored, discover how to be more energy efficient, reduce power consumption, and ultimately cut carbon emissions.

Salesforce & Natterbox, winning together
With demand for personalised customer experience rising, discover how Nattterbox are using their service infrastructure to be superstars of customer service.  

Best practices: Deploying the Intel unite solution 
Find out how Intel are modernising conference rooms to enable innovation by creating smart and connected spaces.