Tune in to this informative webcast to hear industry veterans explore the top strategies for dealing with cyber threats, meeting compliance, and adapting to the newest developments in the security world, such as mobile device management. Click
This white paper discusses the roles of trusted insiders versus outsiders in data breaches; identifying activities and intent when it comes to user-based threats; why user-based monitoring is a promising solution; and more.
This article in our Royal Holloway Security Series argues that an information sharing service between national banking systems and law enforcement agencies could counteract online fraud.
As cybercrime continues to grow, denial of service (DoS) attacks have become far more prevalent. This guide explores the current landscape of DoS attacks and what you can do to protect your network.
This informative guide provides an effective security preparedness plan – which outlines key strategies for stopping advanced persistent threats (APTs) and other forms of sophisticated malware.
TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines