We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Page 5

Latest Threats White Papers

Digital Content Protection LSI for PC-Based Digital TV Receivers

This paper describes a “digital content protection LSI” that prevents the hacking of PC-based digital TV receivers

Date: 09/02/07

Company: Fujitsu

Download now

Close the Zero-Hour Gap: Protection from Emerging Virus Threats

Virus writers have taken to using so-called short-span attacks and serial-variant attacks.

Date: 09/02/07

Company: Proofpoint

Download now

Protecting the BlackBerry device platform against malware

This document describes the third-party application control features of the BlackBerry® Enterprise Solution

Date: 09/02/07

Company: RIM (BlackBerry)

Download now

Addressing the Insider Threat with NetIQ Operational Change Control Solutions

This paper discusses the business issues around insiders and in particular IT administrators in depth

Date: 09/02/07

Download now

Comprehensive Threat Management: Shielding Organizations from Today's Security Challenges

IDC reviews the issues relating to enterprise security needs

Date: 07/02/07

Company: Symantec

Download now

Sophos Security Threat Management Report

How the threat landscape has changed in 2006 and what the likely trends are for the year

Date: 07/02/07

Company: Sophos

Download now

The threat posed by portable storage devices

Strategies and solutions to combat corporate data theft

Date: 06/02/07

Download now

Killing Botnets

An insight into the scale of botnet attacks that have so far received limited news coverage

Date: 01/02/07

Company: McAfee

Download now

Managed File Transfer, The Evolution from Application to Infrastructure

The business and technology drivers that are behind this trend and best practices

Date: 01/02/07

Company: Tumbleweed Communications

Download now

A Practical Approach to Threat Modeling

A practical, high-level guide to conducting threat modeling activities within a business environment.

Date: 01/02/07

Download now



In Depth
Do you have what it takes to become a non-executive?

Do you have what it takes to become a non-executive?

The benefits of board service for CFOs more ..

In Depth
How M&A teams can create value by challenging the CEO

How M&A teams can create value by challenging the CEO

A typical “hold” period of nine to 18 months can generate increased sale value more ..

Advertisement