Social networks have become a new avenue to cybercriminals today, using social engineering to exploit systems and data. In this expert resource, uncover how social networking is impacting data loss prevention (DLP) strategies and explore eight key questions to ask your vendor to help mature your DLP solution.
Explore the multi-vector nature common to most high-profile retail security breaches in this white paper and learn about the several common characteristics of recent breaches and how to protect your data against hackers.
This white paper focuses on the state of phishing and malware attacks and how hackers are evolving. Continue reading to learn mitigation strategies and best practices for educating employees to avoid attacks.
This article in our Royal Holloway Security Series argues that an information sharing service between national banking systems and law enforcement agencies could counteract online fraud.
Hackers are often portrayed as technical geniuses plying their trade through the use of complex computer code. But gaining access to a computer can be as simple as fooling someone into a revealing a password. Read this paper to learn more about social engineering threats and how to defend against them.
This report reveals the latest information about today's top security vulnerabilities and threats – from targeted attacks and exploits to spam and phishing – to help you keep your organization safe. View now to learn more!
TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines