We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Page 5

Latest Threats White Papers

Digital Content Protection LSI for PC-Based Digital TV Receivers

This paper describes a “digital content protection LSI” that prevents the hacking of PC-based digital TV receivers

Date: 09/02/07

Company: Fujitsu

Download now

Close the Zero-Hour Gap: Protection from Emerging Virus Threats

Virus writers have taken to using so-called short-span attacks and serial-variant attacks.

Date: 09/02/07

Company: Proofpoint

Download now

Protecting the BlackBerry device platform against malware

This document describes the third-party application control features of the BlackBerry® Enterprise Solution

Date: 09/02/07

Company: RIM (BlackBerry)

Download now

Addressing the Insider Threat with NetIQ Operational Change Control Solutions

This paper discusses the business issues around insiders and in particular IT administrators in depth

Date: 09/02/07

Download now

Comprehensive Threat Management: Shielding Organizations from Today's Security Challenges

IDC reviews the issues relating to enterprise security needs

Date: 07/02/07

Company: Symantec

Download now

Sophos Security Threat Management Report

How the threat landscape has changed in 2006 and what the likely trends are for the year

Date: 07/02/07

Company: Sophos

Download now

The threat posed by portable storage devices

Strategies and solutions to combat corporate data theft

Date: 06/02/07

Download now

Killing Botnets

An insight into the scale of botnet attacks that have so far received limited news coverage

Date: 01/02/07

Company: McAfee

Download now

Managed File Transfer, The Evolution from Application to Infrastructure

The business and technology drivers that are behind this trend and best practices

Date: 01/02/07

Company: Tumbleweed Communications

Download now

A Practical Approach to Threat Modeling

A practical, high-level guide to conducting threat modeling activities within a business environment.

Date: 01/02/07

Download now



In Depth
How M&A teams can create value by challenging the CEO

How M&A teams can create value by challenging the CEO

A typical “hold” period of nine to 18 months can generate increased sale value more ..

In Depth
What every company needs to do about big data?

What every company needs to do about big data?

In the first of a three part series, Pat Brans explores just how big 'big data' will get? more ..

Advertisement