Intrusion Detection Systems Research
-
Protection on demand: information security that works for you - instead of putting you to work.
Sponsored by: IBMCheck out this white paper to learn more about the new approach to information security, protection on demand, which simplifies security and produces cost savings.
-
Expert eBook: Encryption: Properly Securing Your Valuable Data
Sponsored by: Information Security MagazineCheck out this expert eBook and learn about best practices and techniques for protecting your company's data with encryption technology.
-
Who Is Fighting Phishing: An Overview of the Phishing Lifecycle and the Entities Involved
Sponsored by: MarkMonitorThis white paper addresses the lifecycle of a phishing attack and how different entities--including third-party take down services and law enforcement--are involved in the process of disabling phishing sites.
-
Nationwide Foils Phishers with Markmonitor: Financial Services Giant Achieves ROI with Antiphishing Solutions in Three Months
Sponsored by: MarkMonitorNationwide Building Society, a leading financial institution, has seen a dramatic increase in phishing attacks. By using MarkMonito's AntiPhishing solutions they've been able to quickly shut down phishing sites, saving thousands of pounds per month.
-
Readers' Choice Awards
Sponsored by: Information Security MagazineInformation Security and SearchSecurity.com presented more than 1,600 readers with some 360 security products, divided into 18 categories, three categories which failed to draw sufficient reader response are covered in market articles.
-
Cyber Attacks on the Rise: IBM 2007 Report
Sponsored by: IBMThis white paper shows how the IBM Internet Security Systems X-Force® research and development team discovered, analyzed and recorded new vulnerabilities and the status of varying threats throughout the first six months of this year.
-
Integrating Mobile Access into Your VPN Environment
Sponsored by: AT&T CorpEnterprises are increasingly facing the task of integrating a variety of access services and devices onto their Virtual Private Networks (VPN). This white paper takes a closer look at some key issues that arise when bringing access methods into your VPN.
-
Cascading Risk
Sponsored by: Core Security TechnologiesThis webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.
-
Automated Penetration Testing; Can IT Afford Not To?
Sponsored by: Core Security TechnologiesThis paper contains an overview of penetration testing, a summary of vulnerabilities that can be revealed through penetration testing, and the business and technical benefits of performing penetration testing across your infrastructure.