Security white papers
- The news you choose »
- LOGIN TO ADD TO WATCHLIST
Trend Micro commissioned Osterman Research to undertake a survey of North American and European organisations to determine how and why they are using Microsoft SharePoint and to determine their requirements for security specifically focused on …Read full article » : Wednesday, July 22 - 2009 @ 09:57
As use of the web and browser capabilities grows, so does the prevalence of web-borne malware and compromised websites.
The “classical” attack vector of using malicious executable attachments in emails has been overtaken by the …Read full article » Middle East: Tuesday, July 21 - 2009 @ 13:18
Web threats pose a broad range of risks, including financial damages, identity theft, loss of confidential business information, theft of network resources, damaged brand or personal reputation, and erosion of consumer confidence in e-commerce.
These …Read full article » Middle East: Tuesday, July 21 - 2009 @ 12:38
This TippingPoint white paper will detail the technical aspects of typical phishing campaigns, focusing on the tactics, methodology, and unique features of the phishing e-mail and the phishing Web site.
It will outline how automated, …Read full article » Middle East: Monday, July 20 - 2009 @ 13:25
This Sophos white paper describes how SophosLabs gives businesses the protection they need to ensure business continuity.
It describes how, by analyzing the ‘genetic’ make-up of programs and messages, Sophos’ Genotype technology provides preemptive protection …Read full article » Middle East: Monday, July 20 - 2009 @ 11:39
Now, consider that most of these communications and files are sent and transported without any sort of monitoring, encryption or oversight.
The result is that organizations are deploying a growing array of tools and endpoints …Read full article » Middle East: Thursday, July 16 - 2009 @ 16:26
Today’s business environment is no longer one of office-bound workers using desktop computers permanently attached to a network with well-defined parameters.
In that environment a diligent network administrator could keep the company’s network more or …Read full article » Middle East: Wednesday, July 15 - 2009 @ 11:33
This APC white paper covers the fundamentals of secure networking systems, including firewalls, network topology and secure protocols.
Best practices are also given that introduce the reader to some of the more critical aspects of …Read full article » Middle East: Monday, July 13 - 2009 @ 13:21
Securing the business network is a constantly evolving, resource-consuming task.
Not only has malware become increasingly complex – using blended techniques and spreading ever faster – but also the motivation behind it has changed.