This Information Security Essential Guide on Threat Management explores the new strategies organizations are developing to tackle the threat of today’s growing malware threats and targeted attacks.
The Stuxnet worm has received significant media coverage for the large number of different types of systems it has infected. Symantec Corp. published an informative technical write-up that explains Stuxnet in detail and reports that around 100,000 systems have been infected.
Cybercrime is continuously evolving and attacks occur everyday, costing businesses significant loss and money. In order develop a strong security strategy to reduce your risk of attacks, you must understand cybercrime. Read this executive brief to explore several generations of cybercriminals and the methods and motivations of their attacks.
Instant Messaging (IM) is a valuable business communications tool for your company but its widespread adoption brings the risk of potential worms and viruses. This paper examines seven steps for managing, securing, and auditing your company's use of IM.
A wireless network can help your employees stay productive as they move around your company, but to take advantage of the benefits of wireless networking, you need to be sure that your network is safe from hackers and unauthorized users.
In this white paper, gain new insight on Stuxnet, and uncover recent key findings on where and how it may have originated in the hopes is improving a defense tactic to prevent and defend against it.
In this white paper, we will explore what actually happens during a drive-by attack, the lures used to perpetrate attacks, the technology behind the attacks, and the use of drive-by download attacks in personal data theft and computer takeovers.
Read this presentation transcript to learn what speaker Rich Mogull has to say about the importance of data protection and the future of security in terms of the way security decisions and security breaches affect business.
This technical brief discusses multiple Blue Coat solutions to address malicious content control, enforce acceptable use policies, prevent sensitive information leakage and enhance user productivity on Facebook.