Security white papers
- The news you choose »
- LOGIN TO ADD TO WATCHLIST
To help protect employees from these threats and maintain corporate IT systems free from malware, a multi-layered approach to security is needed. This approach combines protection methods in the cloud, at the gateway, and at …Read full article » Middle East: Monday, August 03 - 2009 @ 16:35
All the software-based solutions were installed and configured to receive the West Coast Labs mail feed.
A series of test messages were then sent through each solution in turn to determine whether they were correctly …Read full article » : Sunday, August 02 - 2009 @ 15:00
Web application firewalls are standalone appliances that sit in front of application servers and examine Web application data to ensure correct application behavior and block suspicious activity.
And that’s just what’s needed in a world …Read full article » Middle East: Sunday, August 02 - 2009 @ 14:35
Workers are more mobile than ever and are taking data out of their organisations on laptops; third parties are connecting to corporate networks on devices that the IT department has little, if no, control over; …Read full article » Middle East: Sunday, August 02 - 2009 @ 14:19
This Sophos white paper describes how, through the powerful integration of cross-threat expertise, automated systems and leading-edge technology, SophosLabs has the global visibility and 24/7 research operation to provide the proactive protection and rapid response …Read full article » Middle East: Thursday, July 30 - 2009 @ 14:03
As a result, robust anti-spam, antivirus and other malware defences are essential to the health of any organisation’s email infrastructure.
These defences must be continually updated yet easy to maintain. To improve the effectiveness of …Read full article » Middle East: Tuesday, July 28 - 2009 @ 17:04
IT departments are under continuous pressure to cut costs by reducing the load on the help desk, and to maximise their return on investment (ROI) in security and network management.
At the same time, organisations …Read full article » Middle East: Saturday, July 25 - 2009 @ 13:34
IT departments have long understood the need to prevent viruses, spyware and other malicious applications or activity from compromising security and disrupting business continuity.
Now the rapid emergence of Web 2.0 is beginning to redefine how …Read full article » Middle East: Thursday, July 23 - 2009 @ 13:26
A zombie is a computer that has been silently infected with malware, giving unauthorised or remote users the ability to control it.
Once a computer has been turned into a zombie, hackers use it to …Read full article » Middle East: Wednesday, July 22 - 2009 @ 13:03
The problem for all of us is that these security incidents are getting worse, and fast. Attacks are getting more sophisticated and networks are becoming more complex.
As more of business moves on-line and internal …Read full article » : Wednesday, July 22 - 2009 @ 10:12