Apple

  • White Papers // Aug 2015

    Apple Native Security - JAMF Software

    Enterprise information security is a never-ending battle against constantly evolving threats. Attackers are increasingly sophisticated and their attack vectors are always changing. The threat landscape is expanding, with new devices joining corporate networks every day. One solution to this security challenge is to embrace the Apple platform and take advantage...

    Sponsored By JAMF Software

  • White Papers // Aug 2015

    The New Reality of Mac in Business

    With the global success of iPhone and iPad, many businesses are embracing the Apple platform. Along with these mobile devices, sales of Mac computers to business are growing. A decade ago, the Mac was an uncommon sight in many businesses and routinely ignored by corporate IT. Today, more and more...

    Sponsored By JAMF Software

  • White Papers // Aug 2015

    The Modern Mobile Workforce

    The work of the modern, mobile workforce is no longer confined by place or by time. Mobile computers, wireless networking, and always-available online services allows for work to get done just about anywhere and at any time. For the modern IT Manager, this way of working offers new challenges and...

    Sponsored By JAMF Software

  • White Papers // Aug 2015

    The Casper Suite - ROI Overview

    In today’s IT environment, it is more important than ever to manage resources with an eye towards efficient deployment and operability. With JAMF Software’s Casper Suite, IT departments can manage their Apple computers and mobile devices across the enterprise simply and effectively. Advance preparation of client machines to ensure consistency...

    Sponsored By JAMF Software

  • White Papers // Jul 2015

    JAMF Software - Managing Apple Devices in a Windows Organization

    The recent rise of Apple devices in a previously Windows-dominated ecosystem presents a challenge for IT admins and decision makers. This report outlines how Apple and Windows devices, tools, and infrastructure can happily integrate together.

    Sponsored By JAMF Software

  • White Papers // Jul 2015

    JAMF Software - Apple Native Security

    Enterprise information security is a never-ending battle against constantly evolving threats. Attackers are increasingly sophisticated and their attack vectors are always changing. The threat landscape is expanding, with new devices joining corporate networks every day. One solution to this security challenge is to embrace the Apple platform and take advantage...

    Sponsored By JAMF Software

  • White Papers // Jul 2015

    JAMF Software - The New Reality of Mac in Business (German)

    With the global success of iPhone and iPad, many businesses are embracing the Apple platform. Along with these mobile devices, sales of Mac computers to business are growing. A decade ago, the Mac was an uncommon sight in many businesses and routinely ignored by corporate IT. Today, more and more...

    Sponsored By JAMF Software

  • White Papers // Jul 2015

    JAMF Software - Apple Native Security (German)

    Enterprise information security is a never-ending battle against constantly evolving threats. Attackers are increasingly sophisticated and their attack vectors are always changing. The threat landscape is expanding, with new devices joining corporate networks every day. One solution to this security challenge is to embrace the Apple platform and take advantage...

    Sponsored By JAMF Software

  • White Papers // Jul 2015

    JAMF Software - Managing Apple Devices in a Windows Organization (French)

    The recent rise of Apple devices in a previously Windows-dominated ecosystem presents a challenge for IT admins and decision makers. This report outlines how Apple and Windows devices, tools, and infrastructure can happily integrate together.

    Sponsored By JAMF Software

  • White Papers // Jul 2015

    JAMF Software - Managing Apple Devices in a Windows Organization (German)

    The recent rise of Apple devices in a previously Windows-dominated ecosystem presents a challenge for IT admins and decision makers. This report outlines how Apple and Windows devices, tools, and infrastructure can happily integrate together.

    Sponsored By JAMF Software

  • White Papers // Jul 2015

    JAMF Software - The New Reality of Mac in Business (French)

    With the global success of iPhone and iPad, many businesses are embracing the Apple platform. Along with these mobile devices, sales of Mac computers to business are growing. A decade ago, the Mac was an uncommon sight in many businesses and routinely ignored by corporate IT. Today, more and more...

    Sponsored By JAMF Software

  • White Papers // Jul 2015

    JAMF Software - The New Reality of Mac in Business

    With the global success of iPhone and iPad, many businesses are embracing the Apple platform. Along with these mobile devices, sales of Mac computers to business are growing. A decade ago, the Mac was an uncommon sight in many businesses and routinely ignored by corporate IT. Today, more and more...

    Sponsored By JAMF Software

  • White Papers // Jul 2015

    JAMF Software - Apple Native Security (French)

    Enterprise information security is a never-ending battle against constantly evolving threats. Attackers are increasingly sophisticated and their attack vectors are always changing. The threat landscape is expanding, with new devices joining corporate networks every day. One solution to this security challenge is to embrace the Apple platform and take advantage...

    Sponsored By JAMF Software

  • White Papers // Jul 2015

    The Guide to Mac OS X Deployments in Business

    So your organization is about to deploy Mac computers to your employees, and you're not sure where to start? That's where the Apple Management Experts can help. Since 2002, JAMF Software—and our Casper Suite solution—have helped organizations across the globe ensure their Apple programs are a success. This guide highlights...

    Sponsored By JAMF Software

  • White Papers // Jul 2015

    Managing Apple Devices in a Windows Organization

    The recent rise of Apple devices in a previously Windows-dominated ecosystem presents a challenge for IT admins and decision makers. This report outlines how Apple and Windows devices, tools, and infrastructure can happily integrate together.

    Sponsored By JAMF Software

  • White Papers // Jul 2015

    The New Reality of Mac in Business

    With the global success of iPhone and iPad, many businesses are embracing the Apple platform. Along with these mobile devices, sales of Mac computers to business are growing. A decade ago, the Mac was an uncommon sight in many businesses and routinely ignored by corporate IT. Today, more and more...

    Sponsored By JAMF Software

  • White Papers // May 2015

    Leveraging The Cloud For Your Big Data Workloads

    This report explores how with the right partner, enterprises can ensure that their Big Data workloads perform consistently, securely, and cost effectively while delivering to a line-of-business colleagues’ need for on-demand, real-time analytics to make smart business decisions.

    Sponsored By IBM

  • White Papers // May 2015

    Leveraging The Cloud For Your DevOps Workloads

    This report explores that by choosing the right PaaS, an IT organization can align development and operations resources, ensuring that applications are deployed quickly, cost-effectively, and error-free.

    Sponsored By IBM

  • White Papers // Apr 2015

    iOS 8 Checklist

    iOS: The last iterations of Apple business dominating OS of choice gave IT new options in security and new concerns in how to manage information sharing.

    Sponsored By IBM

  • White Papers // Oct 2014

    What CIOs need to know in order to capitalize on Hybrid Cloud

    Hybrid cloud brings together the best of both worlds by enabling businesses and their IT organizations unprecedented flexibility in where they host their many and varied workloads. It also increases business agility, the flexibility to use a variety of services, the scalability to keep pace with business volume, the efficiency...

    Sponsored By EMC

  • eBooks // Jun 2015

    Executive's guide to Apple in the enterprise (free ebook)

    Apple's success in the consumer market has pushed the company's technology further into the enterprise than ever before. This new ebook from ZDNet and TechRepublic looks at the implications of the growing business reliance on Apple products.

    Provided By TechRepublic

  • White Papers // May 2015

    Leveraging The Cloud For Your Development and Operations Workloads

    This report explores that by choosing the right PaaS, an IT organization can align development and operations resources, ensuring that applications are deployed quickly, cost-effectively, and error-free.

    Provided By IBM

  • White Papers // May 2015

    iCloud Technology

    Cloud storage is a growing tech trend. Making use of cloud computing technology, cloud storage services give the users password-protected access to online storage space. They can upload files to this storage space as a backup copy of content from their hard drive, as additional space to supplement their hard...

    Provided By Creative Commons

  • Webcasts // Apr 2015

    Exploring Yosemite: Abusing Mac OS X 10.10

    Mac OS X 10.10 Yosemite is going to be released soon. It brings lots of new features as well as security improvements. In this webcast, the presenters are going to review these improvements from both defensive and offensive perspectives: what problems it solved, what issues it brought up and what...

    Provided By SecurityTube.net

  • White Papers // Apr 2015

    Exploring Secure Unix System with Other OS

    Unix is a multiuser, multitasking operating system. It is one of the landmark operating system. It is widely popular operating system around the world. Unix is an open source operating system which makes its usage all the more fun. Unix is very secure operating system and is not much user...

    Provided By International Journal of Computer Science and Mobile Computing (IJCSMC)

  • White Papers // Apr 2015

    Data Protection in Mac OS X

    As the people lives increasingly go digital, data protection has become one of the critical concerns. With data breaches on rise, companies must remain vigilant in safeguarding their assets. Breaches in data security can appreciably cost company customers, reputations and significant fines or damages. OS X is designed from the...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Mar 2015

    Hybrid Operating System in Smart Phone

    Operating System (OS) is the backbone in any Smartphone. With every passing year, newer and latest versions of OSs are being brought in the market. The application and design developers of mobile OS are trying to bring the best of it in every newer version. This paper provides a survey...

    Provided By International Journal of Computer and Information Technology (IJCIT)

  • Webcasts // Feb 2015

    Userland Persistence on Mac OS X It Just Works

    In this webcast, the presenter will show, if given userland administrative access (read: root), how easy it is to persist between reboots without plists, non-native binaries, scripting, and kexts or kernel patching using the backdoor factory.

    Provided By SecurityTube.net

  • White Papers // Feb 2015

    7 Must Haves For Mobile App Security

    Having to trade usability against security puts enterprises in an unenviable position. In this white paper are the minimum requirements that an enterprise must have in a mobile app security solution in order to transform the mobile user experience without compromising on security. Read More...

    Provided By Good Technology

  • White Papers // Feb 2015

    Moving beyond MDM to Mobile Apps

    Now that many organizations are on board with the basics of business mobility, users are hungry for more. Companies everywhere are turning to mobile business apps to empower employees on the go and kickstart productivity. But as these organizations move beyond Mobile Device Management (MDM), IT must ensure that the...

    Provided By Good Technology

  • White Papers // Feb 2015

    5 Traps to avoid in your 2015 mobile App program

    Working with progressive early adopters of mobile apps, Good Technology has gained visibility into successful mobile app programs and deployments. We’ve also seen what traps impede success and/or attainment of planned goals. Below are five (5) pitfalls to avoid in your mobile app program and corresponding recommendations for success. Read...

    Provided By Good Technology

  • White Papers // Feb 2015

    Gartner 2014 Magic Quadrant for Application Secuirty Testing

    IBM has been positioned again in the Leaders quadrant of the Gartner Magic Quadrant for Application Security.

    Provided By IBM

  • Downloads // Dec 2014

    Apple's first employee: The remarkable odyssey of Bill Fernandez (PDF download)

    Best known as the guy who introduced Steve Jobs and Steve Wozniak, Bill Fernandez speaks out on Apple's founding magic, how love built the first Mac, and the computer of the future. Download the full feature article in magazine format as a free PDF that you can read on your...

    Provided By TechRepublic

  • White Papers // Dec 2014

    Thumbnail Image Creation in Hadoop Using Python

    Apache Hadoop is a software framework that supports data-intensive distributed application under a free license. It enables applications to work with thousands of nodes and petabytes of data. Hadoop was inspired by Google's MapReduce and Google File System (GFS) papers. Hadoop was originally developed to support distribution for the Nutch...

    Provided By Creative Commons

  • Podcasts // Nov 2014

    Methods of Malware Persistence on OS X Mavericks

    As Mac OS X continues to increase in popularity, OS X malware, once a rare phenomenon, is now more common than ever. Due to this, it is essential for forensic and malware analysts to possess an in-depth understanding of OS X and how it may be attacked by malicious code.

    Provided By SecurityTube.net

  • White Papers // Nov 2014

    Leveraging The Cloud For Your ERP Workloads

    This report explores how with the right partner, enterprises can ensure that their Big Data workloads perform consistently, securely, and cost effectively while delivering to a line-of-business colleagues’ need for on-demand, real-time analytics to make smart business decisions.

    Provided By IBM

  • Webcasts // Oct 2014

    Understanding TOCTTOU in the Windows Kernel Font Scaler Engine

    The font scaler engine is widely used in Microsoft Windows and Mac OS operating systems for rendering TrueType/OpenType fonts. It was first introduced in 1989. Later, to improve the performance of the Windows NT operating system, Microsoft decided to move the engine from user mode to kernel mode.

    Provided By SecurityTube.net

  • White Papers // Oct 2014

    New : Check out what Professionals need to know in order to capitalize on Hybrid Cloud?

    Hybrid cloud brings together the best of both worlds by enabling businesses and their IT organizations unprecedented flexibility in where they host their many and varied workloads. It also increases business agility — the flexibility to use a variety of services, the scalability to keep pace with business volume, the...

    Provided By EMC

  • White Papers // Oct 2014

    What IT Professionals need to know in order to capitalize on Hybrid Cloud?

    Hybrid cloud brings together the best of both worlds by enabling businesses and their IT organizations unprecedented flexibility in where they host their many and varied workloads. It also increases business agility — the flexibility to use a variety of services, the scalability to keep pace with business volume, the...

    Provided By EMC

  • White Papers // Oct 2014

    What CIO need to Know to capitalize on Hybrid Cloud

    Hybrid cloud brings together the best of both worlds by enabling businesses and their IT organizations unprecedented flexibility in where they host their many and varied workloads. It also increases business agility the flexibility to use a variety of services, the scalability to keep pace with business volume, the efficiency...

    Provided By EMC

  • White Papers // May 2015

    Leveraging The Cloud For Your Big Data Workloads

    This report explores how with the right partner, enterprises can ensure that their Big Data workloads perform consistently, securely, and cost effectively while delivering to a line-of-business colleagues’ need for on-demand, real-time analytics to make smart business decisions.

    Sponsored By IBM

  • White Papers // Oct 2014

    What CIOs need to know in order to capitalize on Hybrid Cloud

    Hybrid cloud brings together the best of both worlds by enabling businesses and their IT organizations unprecedented flexibility in where they host their many and varied workloads. It also increases business agility, the flexibility to use a variety of services, the scalability to keep pace with business volume, the efficiency...

    Sponsored By EMC

  • White Papers // Jul 2015

    Managing Apple Devices in a Windows Organization

    The recent rise of Apple devices in a previously Windows-dominated ecosystem presents a challenge for IT admins and decision makers. This report outlines how Apple and Windows devices, tools, and infrastructure can happily integrate together.

    Sponsored By JAMF Software

  • White Papers // May 2015

    Leveraging The Cloud For Your DevOps Workloads

    This report explores that by choosing the right PaaS, an IT organization can align development and operations resources, ensuring that applications are deployed quickly, cost-effectively, and error-free.

    Sponsored By IBM

  • White Papers // Apr 2015

    iOS 8 Checklist

    iOS: The last iterations of Apple business dominating OS of choice gave IT new options in security and new concerns in how to manage information sharing.

    Sponsored By IBM

  • White Papers // Jul 2015

    JAMF Software - Managing Apple Devices in a Windows Organization

    The recent rise of Apple devices in a previously Windows-dominated ecosystem presents a challenge for IT admins and decision makers. This report outlines how Apple and Windows devices, tools, and infrastructure can happily integrate together.

    Sponsored By JAMF Software

  • White Papers // Jul 2015

    JAMF Software - Apple Native Security

    Enterprise information security is a never-ending battle against constantly evolving threats. Attackers are increasingly sophisticated and their attack vectors are always changing. The threat landscape is expanding, with new devices joining corporate networks every day. One solution to this security challenge is to embrace the Apple platform and take advantage...

    Sponsored By JAMF Software

  • White Papers // Jul 2015

    The Guide to Mac OS X Deployments in Business

    So your organization is about to deploy Mac computers to your employees, and you're not sure where to start? That's where the Apple Management Experts can help. Since 2002, JAMF Software—and our Casper Suite solution—have helped organizations across the globe ensure their Apple programs are a success. This guide highlights...

    Sponsored By JAMF Software

  • White Papers // Jul 2015

    JAMF Software - The New Reality of Mac in Business (German)

    With the global success of iPhone and iPad, many businesses are embracing the Apple platform. Along with these mobile devices, sales of Mac computers to business are growing. A decade ago, the Mac was an uncommon sight in many businesses and routinely ignored by corporate IT. Today, more and more...

    Sponsored By JAMF Software

  • White Papers // Jul 2015

    JAMF Software - Apple Native Security (German)

    Enterprise information security is a never-ending battle against constantly evolving threats. Attackers are increasingly sophisticated and their attack vectors are always changing. The threat landscape is expanding, with new devices joining corporate networks every day. One solution to this security challenge is to embrace the Apple platform and take advantage...

    Sponsored By JAMF Software

  • White Papers // Jul 2015

    JAMF Software - Managing Apple Devices in a Windows Organization (French)

    The recent rise of Apple devices in a previously Windows-dominated ecosystem presents a challenge for IT admins and decision makers. This report outlines how Apple and Windows devices, tools, and infrastructure can happily integrate together.

    Sponsored By JAMF Software

  • White Papers // Jul 2015

    JAMF Software - Managing Apple Devices in a Windows Organization (German)

    The recent rise of Apple devices in a previously Windows-dominated ecosystem presents a challenge for IT admins and decision makers. This report outlines how Apple and Windows devices, tools, and infrastructure can happily integrate together.

    Sponsored By JAMF Software

  • White Papers // Jul 2015

    JAMF Software - The New Reality of Mac in Business (French)

    With the global success of iPhone and iPad, many businesses are embracing the Apple platform. Along with these mobile devices, sales of Mac computers to business are growing. A decade ago, the Mac was an uncommon sight in many businesses and routinely ignored by corporate IT. Today, more and more...

    Sponsored By JAMF Software

  • White Papers // Jul 2015

    JAMF Software - The New Reality of Mac in Business

    With the global success of iPhone and iPad, many businesses are embracing the Apple platform. Along with these mobile devices, sales of Mac computers to business are growing. A decade ago, the Mac was an uncommon sight in many businesses and routinely ignored by corporate IT. Today, more and more...

    Sponsored By JAMF Software

  • White Papers // Jul 2015

    The New Reality of Mac in Business

    With the global success of iPhone and iPad, many businesses are embracing the Apple platform. Along with these mobile devices, sales of Mac computers to business are growing. A decade ago, the Mac was an uncommon sight in many businesses and routinely ignored by corporate IT. Today, more and more...

    Sponsored By JAMF Software

  • White Papers // Jul 2015

    JAMF Software - Apple Native Security (French)

    Enterprise information security is a never-ending battle against constantly evolving threats. Attackers are increasingly sophisticated and their attack vectors are always changing. The threat landscape is expanding, with new devices joining corporate networks every day. One solution to this security challenge is to embrace the Apple platform and take advantage...

    Sponsored By JAMF Software

  • White Papers // Aug 2015

    Apple Native Security - JAMF Software

    Enterprise information security is a never-ending battle against constantly evolving threats. Attackers are increasingly sophisticated and their attack vectors are always changing. The threat landscape is expanding, with new devices joining corporate networks every day. One solution to this security challenge is to embrace the Apple platform and take advantage...

    Sponsored By JAMF Software

  • White Papers // Aug 2015

    The New Reality of Mac in Business

    With the global success of iPhone and iPad, many businesses are embracing the Apple platform. Along with these mobile devices, sales of Mac computers to business are growing. A decade ago, the Mac was an uncommon sight in many businesses and routinely ignored by corporate IT. Today, more and more...

    Sponsored By JAMF Software

  • White Papers // Aug 2015

    The Modern Mobile Workforce

    The work of the modern, mobile workforce is no longer confined by place or by time. Mobile computers, wireless networking, and always-available online services allows for work to get done just about anywhere and at any time. For the modern IT Manager, this way of working offers new challenges and...

    Sponsored By JAMF Software

  • White Papers // Aug 2015

    The Casper Suite - ROI Overview

    In today’s IT environment, it is more important than ever to manage resources with an eye towards efficient deployment and operability. With JAMF Software’s Casper Suite, IT departments can manage their Apple computers and mobile devices across the enterprise simply and effectively. Advance preparation of client machines to ensure consistency...

    Sponsored By JAMF Software

  • Downloads // Apr 2014

    Stadiums race to digitize (PDF download)

    Younger fans are leaving stadiums when they can't get connected, so sports teams are finally embracing technology as a way to improve the fan experience and increase the team’s bottom line. Download the full feature article from TechRepublic's Teena Hammond in magazine format as a free PDF that you can...

    Provided By TechRepublic

  • Downloads // Dec 2014

    Apple's first employee: The remarkable odyssey of Bill Fernandez (PDF download)

    Best known as the guy who introduced Steve Jobs and Steve Wozniak, Bill Fernandez speaks out on Apple's founding magic, how love built the first Mac, and the computer of the future. Download the full feature article in magazine format as a free PDF that you can read on your...

    Provided By TechRepublic

  • White Papers // Oct 2014

    What CIO need to Know to capitalize on Hybrid Cloud

    Hybrid cloud brings together the best of both worlds by enabling businesses and their IT organizations unprecedented flexibility in where they host their many and varied workloads. It also increases business agility the flexibility to use a variety of services, the scalability to keep pace with business volume, the efficiency...

    Provided By EMC

  • White Papers // Sep 2013

    What iOS 7 means for the enterprise

    Apple’s iOS 7 brings over 200 new consumer and business features to iOS devices, including over 40 features that specifically enable or enhance key Enterprise Mobility Management (EMM) capabilities. These new EMM capabilities respond to what enterprises need to fully embrace iOS devices as critical business tools. They also require...

    Provided By MobileIron

  • White Papers // Jul 2013

    Intuitive Display of Complex Data on iOS

    This paper studies the design process for an iOS application. The software in question accepts a high-bandwidth, real-time stream of multidimensional data from a hardware accessory, and must present this data to the user in a form that can be easily understood and manipulated. This paper will examine the decisions...

    Provided By Vanteon Corp

  • White Papers // Mar 2014

    Essential Wi-Fi services for Smartphones and Tablets

    Smartphones and tablets have become an integral part of our lives, especially for work, people need dependable and high performance Wi-Fi. This executive brief takes a look at five essential Wi-Fi services which provide a smartphone and tablet a trusted experience. With Aruba Networks service, it’s believed that, workplaces will...

    Provided By Aruba Networks

  • White Papers // Nov 2013

    Get a Big Business Phone Communications Solution at a Small Business Price

    VoIP lets you make phone calls over the Internet, rather than a traditional phone line. It’s a hosted and flexible phone communications solution that works the way you do. Service is scalable to your business, manageability is simple via a customer web portal and there is no need for IT...

    Provided By Alaska Communications

  • White Papers // Dec 2014

    Thumbnail Image Creation in Hadoop Using Python

    Apache Hadoop is a software framework that supports data-intensive distributed application under a free license. It enables applications to work with thousands of nodes and petabytes of data. Hadoop was inspired by Google's MapReduce and Google File System (GFS) papers. Hadoop was originally developed to support distribution for the Nutch...

    Provided By Creative Commons

  • Webcasts // Mar 2012

    Free Floating Hostility

    In this webcast, the presenter will explain about a list topics the users should all be bored with, tired of, or pissed at. Things that they all should have abandoned long ago, but somehow cling to like a false God. Topics will cover a number of things broadly recognized by...

    Provided By SecurityTube.net

  • White Papers // Jul 2008

    MEGA: A Tool for Mac OS X Operating System and Application Forensics

    Computer forensic tools for Apple Mac hardware have traditionally focused on low-level file system details. Mac OS X and common applications on the Mac platform provide an abundance of information about the user's activities in configuration files, caches, and logs. The authors are developing MEGA, an extensible tool suite for...

    Provided By Reed Elsevier

  • White Papers // Apr 2015

    Exploring Secure Unix System with Other OS

    Unix is a multiuser, multitasking operating system. It is one of the landmark operating system. It is widely popular operating system around the world. Unix is an open source operating system which makes its usage all the more fun. Unix is very secure operating system and is not much user...

    Provided By International Journal of Computer Science and Mobile Computing (IJCSMC)

  • Webcasts // Apr 2015

    Exploring Yosemite: Abusing Mac OS X 10.10

    Mac OS X 10.10 Yosemite is going to be released soon. It brings lots of new features as well as security improvements. In this webcast, the presenters are going to review these improvements from both defensive and offensive perspectives: what problems it solved, what issues it brought up and what...

    Provided By SecurityTube.net

  • eBooks // Jun 2015

    Executive's guide to Apple in the enterprise (free ebook)

    Apple's success in the consumer market has pushed the company's technology further into the enterprise than ever before. This new ebook from ZDNet and TechRepublic looks at the implications of the growing business reliance on Apple products.

    Provided By TechRepublic

  • White Papers // Apr 2015

    Data Protection in Mac OS X

    As the people lives increasingly go digital, data protection has become one of the critical concerns. With data breaches on rise, companies must remain vigilant in safeguarding their assets. Breaches in data security can appreciably cost company customers, reputations and significant fines or damages. OS X is designed from the...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • Webcasts // Feb 2015

    Userland Persistence on Mac OS X It Just Works

    In this webcast, the presenter will show, if given userland administrative access (read: root), how easy it is to persist between reboots without plists, non-native binaries, scripting, and kexts or kernel patching using the backdoor factory.

    Provided By SecurityTube.net

  • White Papers // Feb 2015

    Gartner 2014 Magic Quadrant for Application Secuirty Testing

    IBM has been positioned again in the Leaders quadrant of the Gartner Magic Quadrant for Application Security.

    Provided By IBM

  • Webcasts // Oct 2014

    Understanding TOCTTOU in the Windows Kernel Font Scaler Engine

    The font scaler engine is widely used in Microsoft Windows and Mac OS operating systems for rendering TrueType/OpenType fonts. It was first introduced in 1989. Later, to improve the performance of the Windows NT operating system, Microsoft decided to move the engine from user mode to kernel mode.

    Provided By SecurityTube.net

  • Podcasts // Nov 2014

    Methods of Malware Persistence on OS X Mavericks

    As Mac OS X continues to increase in popularity, OS X malware, once a rare phenomenon, is now more common than ever. Due to this, it is essential for forensic and malware analysts to possess an in-depth understanding of OS X and how it may be attacked by malicious code.

    Provided By SecurityTube.net

  • White Papers // May 2014

    iOS Security and Privacy: Authentication Methods, Permissions, and Potential Pitfalls with Touch ID

    The authors investigate the conceptual problem with iOS security, surveying a number of issues encompassing the utilization of biometric authentication. Specifically, they suggest that data collected from fingerprint scans for the purpose of authenticating an iOS user may be recorded by Apple, generating privacy issues. Furthermore, the potential for faking...

    Provided By International Journal of Computer and Information Technology (IJCIT)

  • White Papers // Sep 2014

    5 Things Every Small Business Should Know About MAC Security

    Some Macs that make it to workplaces are personally owned, thanks to the bring-your-own-device (BYOD) trend, which allows employees to use their own devices for work. Naturally, security concerns arise because confidential business data is freely transferred from office-issued to personally owned devices. IT departments’ struggle to manage and support...

    Provided By Trend Micro