Security white papers
- The news you choose »
- LOGIN TO ADD TO WATCHLIST
Email today presents a serious risk to security, business productivity, and compliance with government and industry regulations.
As the use of email for legitimate business purposes
continues to trend upward, so does its use as …
In today’s increasingly connected world, the challenges to maintaining business continuity seem never-ending.
Shifting operational priorities, complex and evolving networks, and mounting internal and external security risks have led to an increasingly volatile environment.
Nowhere …Read full article » Middle East: Thursday, August 13 - 2009 @ 16:51
Spyware poses a constant and significant security risk to organisations, stealing or damaging confidential corporate information and opening up networks to further attack. Its intent is malicious.
It installs itself onto a user’s computer by stealth, …Read full article » Middle East: Thursday, August 13 - 2009 @ 14:38
The meaning of computer security continues to evolve.
Physical security used to be the main concern. Through the 1980s, expensive mainframe computers were locked in special climate-controlled rooms within secure buildings.
Today, the widespread use of …Read full article » Middle East: Wednesday, August 12 - 2009 @ 13:43
This Sophos white paper examines the primary data threats that currently concern chief security officers (CSOs) and IT security management within enterprises, and recommends best-practice techniques to minimize and overcome risks to data security.
These …Read full article » Middle East: Tuesday, August 11 - 2009 @ 16:44
Virtualisation technology has been around for more than 40 years, but it wasn’t until recently that it really took off in the enterprise thanks to its promise of hardware savings and increased agility.
By encapsulating and …Read full article » Middle East: Monday, August 10 - 2009 @ 12:11
Businesses adopting new technologies, and workers bringing software and devices into the workplace to facilitate communication and information-gathering, are giving hackers new opportunities for exploitation.
This security threat white paper from Sophos examines the malware trends …Read full article » Middle East: Sunday, August 09 - 2009 @ 16:15
Following the development by Bell Labs in the 1950s of an experimental game in which players used malicious programs to attack each other’s computers, the idea of viruses and worms infecting and spreading across networks …Read full article » Middle East: Wednesday, August 05 - 2009 @ 08:58
This increase in volume has been fueled by the evolution of common business enablers, such as universal web access and the dependence on the Internet for business-critical communications. To capitalize on an increasingly available target, …Read full article » Middle East: Wednesday, August 05 - 2009 @ 08:42
Regulating internet access in the workplace
is a delicate balancing act.
The web provides employees with valuable information and tools that enhance productivity and competitive advantage, but it can also devastate business productivity with its …Read full article » Middle East: Tuesday, August 04 - 2009 @ 15:52