Hackers Research
-
Ethical Hacking and Risk Assessments
Sponsored by: Global KnowledgeAttend this webcast to learn about risk assessment process and tools used by ethical hackers.
-
Who Is Fighting Phishing: An Overview of the Phishing Lifecycle and the Entities Involved
Sponsored by: MarkMonitorThis white paper addresses the lifecycle of a phishing attack and how different entities--including third-party take down services and law enforcement--are involved in the process of disabling phishing sites.
-
Nationwide Foils Phishers with Markmonitor: Financial Services Giant Achieves ROI with Antiphishing Solutions in Three Months
Sponsored by: MarkMonitorNationwide Building Society, a leading financial institution, has seen a dramatic increase in phishing attacks. By using MarkMonito's AntiPhishing solutions they've been able to quickly shut down phishing sites, saving thousands of pounds per month.
-
Defining Your Corporate Mobile Policies
Sponsored by: TechTarget SecurityIt's important that corporate mobile policies cover everything from what types of devices will be available to users, to how and when they can use them Read this e-guide to learn more about developing appropriate mobile policies for your organization
-
Expert Ebook: Mastering PCI
Sponsored by: Information Security Magazine Sponsored by: Breach, Cisco, Fiberlink, Rapid7, Sentrigo, Solidcore, Thawte, Tripwire, and UtimacoThis eBook gives expert advice on successfully achieving PCI compliance, by selecting the right auditor and implementing new requirements into your company's IT infrastructure. Read this book and learn how to master PCI compliance.
-
Symantec Internet Security Threat Report: Trends for July-December 07
Sponsored by: Symantec CorporationThis summary of the Internet Security Threat Report will alert readers to current trends and impending threats that Symantec has observed for the six-month period from July 1 to December 31, 2007.
-
Key Steps to Securing Your Organization and Evicting a Hacker
Sponsored by: Foundstone, Inc.This podcast will tech you key steps for getting your company back on track after a security breach. It discusses effective measures that can be put into place, and how to take a proactive approach in securing your company against malicious attacks.
-
Breakthrough Data Recovery for AIX - Vision Solutions
Sponsored by: Vision SolutionsThe purpose of this podcast is to provide a roadmap to the most effective strategy and technology to protect data and provide fast recovery for data which is lost or corrupted due to accident and malicious action.
-
Best Practices for Database Security and Compliance
Sponsored by: Guardium, an IBM CompanyAttend this live Webcast with Forrester Principal Analyst Noel Yuhanna to learn about best practices for protecting enterprise data from both external hackers and insiders such as privileged users and disgruntled employees.
-
Increase Productivity and Reduce Security Risks for Teleworkers
Sponsored by: SonicWALLThis paper provides an overview of how teleworking helps meet today's productivity demands. It discusses additional network security risks that anywhere access can create, and how SonicWALL addresses these concerns while offering additional benefits.
-
Global Threat Research Report: Russia
Sponsored by: VeriSign, IncThis report takes an in-depth look at the security threat the Russian Business Network (RBN) is to North American-based enterprise businesses. Learn more about their current infrastructure, its corruption, and the impact the RBN has on business today.
-
The Case for Application Security: How Real Is the Threat and What Are Your Options
Sponsored by: Fortify SoftwareThis white paper examines the current hacking landscape and details what you can do to prevent a security breach within your organization. Read this white paper today and learn about the pros and cons of various application security solutions.
-
Targeted Cyber Attacks
Sponsored by: GFI SoftwareCyber attack is the name given by (usually sensationalist) articles and documents describing crimes that occur in a virtual world as opposed to tangible attacks such as war.
-
7 Key Factors to Software Protection
Sponsored by: ArxanThis white paper explores the magnitude and types of software piracy threats and details the seven key application security factors that must be considered during the development process.
-
Ten Ways Hackers Breach Security
Sponsored by: Global KnowledgeHacking, cracking, and cyber crimes can wreak havoc on an organization. This white paper discusses ten common methods hackers use to breach your existing security, and what you can do to protect yourself.