We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Page 5

Latest Threats White Papers

Digital Content Protection LSI for PC-Based Digital TV Receivers

This paper describes a “digital content protection LSI” that prevents the hacking of PC-based digital TV receivers

Date: 09/02/07

Company: Fujitsu

Download now

Close the Zero-Hour Gap: Protection from Emerging Virus Threats

Virus writers have taken to using so-called short-span attacks and serial-variant attacks.

Date: 09/02/07

Company: Proofpoint

Download now

Protecting the BlackBerry device platform against malware

This document describes the third-party application control features of the BlackBerry® Enterprise Solution

Date: 09/02/07

Company: RIM (BlackBerry)

Download now

Addressing the Insider Threat with NetIQ Operational Change Control Solutions

This paper discusses the business issues around insiders and in particular IT administrators in depth

Date: 09/02/07

Download now

Comprehensive Threat Management: Shielding Organizations from Today's Security Challenges

IDC reviews the issues relating to enterprise security needs

Date: 07/02/07

Company: Symantec

Download now

Sophos Security Threat Management Report

How the threat landscape has changed in 2006 and what the likely trends are for the year

Date: 07/02/07

Company: Sophos

Download now

The threat posed by portable storage devices

Strategies and solutions to combat corporate data theft

Date: 06/02/07

Download now

Killing Botnets

An insight into the scale of botnet attacks that have so far received limited news coverage

Date: 01/02/07

Company: McAfee

Download now

Managed File Transfer, The Evolution from Application to Infrastructure

The business and technology drivers that are behind this trend and best practices

Date: 01/02/07

Company: Tumbleweed Communications

Download now

A Practical Approach to Threat Modeling

A practical, high-level guide to conducting threat modeling activities within a business environment.

Date: 01/02/07

Download now



In Depth
Can finance rise to the challenge of major transformation?

Can finance rise to the challenge of major transformation?

Outdated finance processes, systems and competencies leave too many questions unanswered more ..

In Depth
Interim CFO or consultant? The pros and cons

Interim CFO or consultant? The pros and cons

Ed Harding offers an insight into the life of an interim CFO and the advantages in driving transformation more ..

Advertisement