Read this presentation transcript to learn what speaker Rich Mogull has to say about the importance of data protection and the future of security in terms of the way security decisions and security breaches affect business.
Instant Messaging (IM) is a valuable business communications tool for your company but its widespread adoption brings the risk of potential worms and viruses. This paper examines seven steps for managing, securing, and auditing your company's use of IM.
This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Forefront Security for Exchange helps protect your email infrastructure from infection and downtime through an approach that emphasizes layered defenses, optimization of Exchange Server performance and availability, and simplified management control.
This technical brief discusses multiple Blue Coat solutions to address malicious content control, enforce acceptable use policies, prevent sensitive information leakage and enhance user productivity on Facebook.
Learn how Gloucestershire NHS was able to help 1700 client computers send and receive vital information safely and efficiently by installing Panda's Managed Office Protection Antivirus solution.
This white paper shows how the IBM Internet Security Systems X-Force® research and development team discovered, analyzed and recorded new vulnerabilities and the status of varying threats throughout the first six months of this year.
In this white paper, we will explore what actually happens during a drive-by attack, the lures used to perpetrate attacks, the technology behind the attacks, and the use of drive-by download attacks in personal data theft and computer takeovers.
Cybercrime is continuously evolving and attacks occur everyday, costing businesses significant loss and money. In order develop a strong security strategy to reduce your risk of attacks, you must understand cybercrime. Read this executive brief to explore several generations of cybercriminals and the methods and motivations of their attacks.