This article in our Royal Holloway Information Security Thesis Series looks at how four sources of risk are relevant for evaluating the influence of software vulnerabilities on businesses.
This white paper takes you through the history and development of firewalls and explores each generation's strengths and weaknesses. Read on to learn what characteristics you need in a next-gen firewall to improve your security strategy.
This free e-book gives you essential information on advanced threat protection (ATP), including tips for using big data security analytics and best practices for advanced threat mitigation.
This webcast examines how hackers are evolving their techniques to achieve their goals faster and undetected and the top 10 attacks they use. Inside, learn how a risk based approach prioritizes vulnerabilities differently than the "high, medium, low" strategy and why it's imperative to make the switch. View now to learn more.
TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines