Security
What's worse than getting hit with a security breach? Getting hit with an easily preventable one.
-
ESG Whitepaper - Virtualization moves the SMB market forward
The whitepaper talks about the pressures that SMB is facing --including small budgets, limited skill sets among IT staff, and limitations in their existing processes. But today, they have opportunitie...
Sponsored By VMware
-
Ten Steps to Better, Stronger Passwords
Hackers are everywhere, and they have a sophisticated array of tools for cracking your passwords. The primary purpose of this white paper is to help you understand that easy-to-remember passwords are ...
Sponsored By Global Knowledge
-
Taneja Group Executive Summary: An overview of the Virtualization and Cloud Market Vendor Landscape for Small and Medium Businesses
Taneja Group presents an evaluation of the virtualization and cloud solution market for small and medium business (SMB) users (companies with less than 1000 employees). This executive summary evaluate...
Sponsored By VMware
-
The Competitive Edge: Powerful Application Solutions for CRM and ERP
Enabling midsize companies to realize their potential in this globally integrated economy, midsize businesses need to take advantage of emerging opportunities. IBM and its Business Partners understand...
Sponsored By IBM
-
Engines of a Smarter Planet experience
Midsize businesses are the thinkers and doers that are driving economic growth. IBM and its Business Partners are providing these businesses with insights, tools and affordable solutions to help them ...
Sponsored By IBM
-
Seven Security Myths of Windows 7
Network security is everyone's concern, and this applies to computer security as well. Many security breaches occur due to user ignorance of basic security principles, not malicious intent. Network an...
Sponsored By Global Knowledge
-
Mind the Gap: What is an ITIL® Gap Analysis?
Organizations adopting ITIL best practices almost always ask, "Where do I begin?". The answer is a gap analysis. ITIL describes a gap analysis as a means of identifying areas where an organization fal...
Sponsored By Global Knowledge
-
New Topics on Security SY0-301 from Domains 2.0-6.0
The CompTIA Security+ 2011 (SY0-301) exam has been significantly updated; the revamped exam focuses more on risk, operational security, and mobile device security. It also clearly emphasizes security ...
Sponsored By Global Knowledge
-
Arguments Against Virtualization - And Why They Are Wrong
There are many misconceptions about virtualization and its effect on applications and the existing infrastructure. Most of these misconceptions are the result of bad information, not enough informatio...
Sponsored By Global Knowledge
-
Hacking Back in Self-Defense: Is It legal? Should It Be?
Hacking? Bots? The bottom-line is we are losing the war. Businesses must be able to defend themselves to prevent the loss of money, technology, and secrets. As new laws are explored, old ones amended,...
Sponsored By Global Knowledge
-
VMware vCenter Converter: Overview, P2V Tips, and Security Concerns
vCenter Converter is becoming more robust and powerful with each new revision, and this white paper examines many common problems and possible solutions. Most systems can be virtualized, and the perce...
Sponsored By Global Knowledge
-
Ten New Topics on Security+ 2011 (SY0-301) (Domain 1.0: Network Security)
The CompTIA Security+ 2011 (SY0-301) exam has been significantly updated and covers 60 new topics not present in the previous version of the exam. The first topical domain: Network Security, is ever e...
Sponsored By Global Knowledge
-
Security Log Analysis: Saving the World, One Company at a Time
Security logs are dangerous when they are not capturing data, or when the data is not being analyzed regularly and properly. Scouring your security logs, devouring the details, will make you and your ...
Sponsored By Global Knowledge
-
Overlay Transport Virtualization: An Introduction
Overlay transport virtualization (OTV) can address a lot of challenges presented in today's data center as far as moving components of the data center from one side to the other and making those sites...
Sponsored By Global Knowledge
-
SP1 for Windows 7 and Windows Server 2008 R2: What's New?
This white paper examines the new features and updates in Service Pack 1 (SP1) for Windows 7 and SP1 for Windows Server 2008 R2, both of which were released on February 22, 2011. Although the two serv...
Sponsored By Global Knowledge
-
10 Essential Security Policies
Every organization needs a corporate security policy to firmly establish guidelines that will keep the company's resources and knowledge safe. This white paper discusses ten such guidelines that shoul...
Sponsored By Global Knowledge
-
14 Security Policy Tips
Every organization needs a security policy. If you already have one, then there are several important considerations you need to make in regards to your existing security strategy. If you have not yet...
Sponsored By Global Knowledge
-
How to Defend Against DDoS Attacks and Strengthen Security Controls
After WikiLeaks released classified U.S. documents, companies that provided WikiLeaks with access to funding were encouraged to or decided to stop. What followed was a well-organized revenge plot (orc...
Sponsored By Global Knowledge
-
SharePoint 2010 Document Sets: Better Ways To Manage Content
Content management is the process of managing information from a technology perspective. It encompasses all facets of data management to include the process of collecting and distributing information,...
Sponsored By Global Knowledge
-
Windows 7 and AppLocker
AppLocker represents some significant improvements to Software Restriction Policies. The ability to use digital signature information, the ability to use greater-than and less-than operators for versi...
Sponsored By Global Knowledge
-
TechRepublic's Geek Gift Guide 2009
Regardless of their current economic situation, technology geeks love to give and receive electronic gadgets. And, it is not just any gadget they want, but the best electronic gizmos. TechRepublic onc...
Sponsored By TechRepublic
-
Understanding the Benefits of Windows 7 for Creating Efficient IT in Healthcare
Security is more important in the healthcare setting than many other industries. Breaches of patient data can result in HIPAA violations and government investigations. Breaches of system security can ...
Provided By Dell
-
Solving on-premise email management challenges with on-demand services
The difficulty of managing complex email and messaging systems grows stronger every day. Keeping email up and running – regardless of device – drives many IT managers to turn to on-premises solutions ...
Provided By Dell Software
-
India Webinar: Protecting Users & Data in the Mobile Enterprise
On Tuesday 18th of June, at 11am IST, popular ZDNet contributor Phil Dobbie and Abhishek Baxi talked to: Ed Metcalfe, Director of Product Marketing at McAfee & Perry Olson, Senior Director, Strategic ...
Provided By Intel/McAfee
-
India Webinar: Protecting Users & Data in the Mobile Enterprise
On Tuesday 18th of June, at 11am IST, popular ZDNet contributor Phil Dobbie and Abhishek Baxi talked to: Ed Metcalfe, Director of Product Marketing at McAfee & Perry Olson, Senior Director, Strategic...
Provided By Intel/McAfee
-
Tech Roundup: Combat complex security risks
In today’s business, it’s rare for a week to go by without reports of a high-profile data breach or a denial-of-service attack. Organisations are susceptible to myriad of risks, and according to Gartn...
Provided By TechRepublic
-
The Forrester Wave: Email Content Security
In Forrester’s 47 criteria evaluation of email content security vendors, it identified the nine most significant vendors in the category and researched, analyzed, and scored them: Barracuda Networks,...
Provided By AU: McAfee
-
Forrester Report: Determine The Business Value Of An Effective Security Program - Information Security Economics 101
This report outlines the approach by Forrester to help you financially model information security. In the seemingly never-ending cycle of new technologies, cyberthreats, and regulations, it is almost ...
Provided By Akamai
-
Top 10 Reasons to Strengthen Information Security with Desktop Virtualisation
Information security has become an increasingly critical concern for organisations of all kinds. Today’s threats are more potent than ever. This white paper discusses the top ten benefits of using des...
Provided By Citrix Systems
-
Blended security threats need a unified response
Security threats are becoming increasingly complex, sophisticated and targete and no organisation is immune, no matter how small it may be or how large a security staff it can maintain. At the same ti...
Provided By Bloor Research
-
Build Your IT Security Business Case
The importance of IT security to a business has never been greater. But often, investments are shelved or cutbacks are made. This can result in businesses unknowingly making compromises regarding thei...
Provided By Kaspersky Lab
-
Your Data Under Siege: Guard the Gaps with Patch Management
Are you guarding the cybersecurity gaps with patch management? How often do your employees select "install" when they get a notification pop-up message and how often do they choose the "later" option...
Provided By Kaspersky Lab
-
Your Data Under Siege: Defend It with Encryption
Is your cyber security doing enough to protect your new, hyper-mobile business practices? Whether they are working in your headquarters, a home office, or on the road, employees, partners, and vendor...
Provided By Kaspersky Lab
-
Your Data under Siege: Defeating the Enemy of Complexity
Complexity is to cybersecurity what kryptonite is to Superman. Even if you have adequate antivirus protection, are there still holes in your IT security armor? Is lack of bandwidth to manage the growi...
Provided By Kaspersky Lab
-
IDC Technology Spotlight Delivering Endpoint Integration and Control
Organizations are struggling to keep pace with a constantly evolving threat landscape, while also keeping a firm grip on an ever-expanding array of devices, software, applications, hardware and user p...
Provided By Kaspersky Lab
-
Why Complexity Is IT Security’s Worst Enemy
Organizations across the world continue to strive for greater agility, efficiency and innovation. But they also need to cut costs, improve productivity and become more competitive. While this is nothi...
Provided By Kaspersky Lab
-
Why phishing is back as the No. 1 web threat, and how web security can protect your company
At one point, it seemed that phishing was receding to the status of a minor issue threatening only naive consumers. But a new version has emerged, fueled by new cybercriminals and new phishing techniq...
Provided By Webroot Software
-
Web Threats Expose Businesses to Data Loss Commissioned Study
Webroot recently conducted research to assess the state of the Web security layer in organizations throughout the United States and the United Kingdom. The study—which focused on companies that curren...
Provided By Webroot Software
-
802.11ac Action Plan: A Network-Readiness Checklist
Products based on the upcoming IEEE 802.11ac wireless-LAN (WLAN) standard are indeed going to dominate the enterprise wireless local-area network landscape. But as is often the case with new technolog...
Provided By Aruba Networks
-
Reducing Pairing Inversion to Exponentiation Inversion using Non-degenerate Auxiliary Pairing
The security of pairing-based cryptosystems is closely related to the difficulty of the pairing inversion problem. Building on previous works, the authors provide further contributions on the difficul...
Provided By Ewha Womans University
-
Windows Server 2012 and the Resilient File System (ReFS)
Over the past 20 years, NTFS has become the de facto standard for a Microsoft enterprise file system. With the introduction of Windows Server 2012, Microsoft has released its latest file system, Resil...
Sponsored By Global Knowledge
-
Creating the Ultimate Security Platform
It may sound counterintuitive, but business security challenges aren’t always only about security. Sure, keeping the bad guys out is the ultimate goal. But the challenges an organization faces every d...
Sponsored By IBM
-
Counter Stealth Attacks
The most menacing type of cyberattack is invisible. A stealthy attack operates quietly, hiding evidence of an attacker’s actions. Since they do not see the threat, administrators often believe they do...
Sponsored By McAfee
-
Engines of a Smarter Planet experience
Midsize businesses are the thinkers and doers that are driving economic growth. IBM and its Business Partners are providing these businesses with insights, tools and affordable solutions to help them ...
Sponsored By IBM
-
Enterprise Solution Design for SAP HANA
This paper provides insights regarding the importance of defining the reference architecture, development standards, modeling and security approaches, and implementation methodologies for implementing...
Sponsored By HP & Intel® Xeon® Processors
-
Protection for Every Enterprise: How BlackBerry 10 Security Works
If you’re choosing a platform for enterprise-grade Mobile Device Management, security is probably near the top of your list of requirements. And if you’re in IT, you don't just want the highlights – y...
Sponsored By BlackBerry
-
HP AppSystems for SAP HANA Use Case: Utilities
See how SAP HANA, run on Intel-powered HP solutions, enable utility companies to address their smart grid challenges by enabling them to boost customer satisfaction and retention, create energy effici...
Sponsored By HP & Intel® Xeon® Processors
-
BlackBerry 10 Security - What IT Needs To Know
Discover how BlackBerry® Security covers the full range of security needs cross-platform, with data leakage protection, certified encryption, BlackBerry® Balance™ and containerization. Plus, find out ...
Sponsored By BlackBerry
-
Legal Issues of Cloud Forensics
Cloud forensics involves exploring issues a company and its forensic examiner may face when suffering a breach of company information in the cloud. If they need to collect information from the cloud t...
Sponsored By Global Knowledge
-
How to Defend Against DDoS Attacks and Strengthen Security Controls
After WikiLeaks released classified U.S. documents, companies that provided WikiLeaks with access to funding were encouraged to or decided to stop. What followed was a well-organized revenge plot (orc...
Sponsored By Global Knowledge
-
Building a Web Security Architecture: Physical Appliance, Virtual Appliance, SaaS, or Hybrid - ESG
CISOs recognize the risk threats such as phishing, fake antivirus (AV), and search engine poisoning bring, and are anxious to invest in web security technology to safeguard users. Unfortunately, it’s ...
Sponsored By Blue Coat Systems
-
Freeform Dynamics Report - The End User Security Jigsaw
Organisations of all sizes are trying to understand the security implications of mobile working, device proliferation and BYOD. But with IT vendors offering up a broad range of options, it can be hard...
Sponsored By McAfee
-
SANS Survey on Mobility/BYOD Security Policies and Practices
In this new survey on BYOD policy and controls, more than 95% of the 650-plus respondents said that policy is a critical protection that needs to be integrated into overall risk management policy. Yet...
Sponsored By McAfee
-
McAfee Enterprise Mobility Management Solution Brief
How would it change your approach to mobilizing your workforce if you could manage all your endpoints (mobile smartphones and tablets, traditional laptop PCs/Macs/desktop PCs, company-issued endpoints...
Sponsored By McAfee
-
Controlling and Managing Superuser Access
“Super users” – those people with greater access and rights – are a necessary part of IT. However, privileged accounts carry implicit security risks, so securing them – while preserving access and eas...
Sponsored By Dell Software
-
Case Study: Specsavers- scalability, flexibility & simplicity
With its dramatic growth over the last 10 years, staff numbers continue to grow, as does the need for secure remote access. So Specsavers required a secure remote access solution that would be: - Sca...
Sponsored By SafeNet, Inc.
-
Whitepaper: Multifactor authentication - Current usage and trends
This white paper draws on a large survey to provide a current picture of the authentication landscape in Europe, the Middle East, and Africa (EMEA), and it offers insights into how this landscape is e...
Sponsored By SafeNet, Inc.
-
Infographic: Deploying authentication to 20k users over a coffee
Gartner predicts that, by 2017, more than 50% of enterprises will choose cloud-based services as the delivery option for new or refreshed user authentication implementation, up from less than 10% toda...
Sponsored By SafeNet, Inc.
-
What is Adaptive Redaction? - Video
Information management can become extremely complex and costly if not managed efficiently, but with effective Information Governance policy in place, you can stay ahead of the competition and uncover ...
Sponsored By Clearswift
-
The Enemy Within: an emerging threat - Infographic
Research information from 300 IT decision makers in companies of various sizes in the UK across three key sectors: defence/aerospace, local government and finance/banking to identify the key security ...
Sponsored By Clearswift
-
The Enemy Within: an emerging threat - Blog
Read the blog announcement of the research report 'The Enemy Within', conducted to review the extent to which internal threats are affecting UK organisations.
Sponsored By Clearswift
-
Nominations For Sale
Models of nomination politics in the US often find "Gridlock" in equilibrium because of the super-majority requirement in the Senate for the confirmation of presidential nominees. A blocking coalition...
Provided By Munich Personal Repec Archive
-
On The Effectiveness Of Carbon-Motivated Border Tax Adjustments
As governments consider commitments to reduce carbon emissions, an accompanying question is what adjustments are appropriate to counteract any competitive disadvantage to domestic producers resulting ...
Provided By ESCAP
-
Integration Of Landlocked Countries Into The Global Economy And Domestic Economic Reforms: The Case Of Lao People's Democratic Republic
The special needs and difficulties of landlocked countries as they seek to achieve integration into the global economy have been increasingly recognized by the international community as requiring par...
Provided By ESCAP
-
Riskiness, Risk Aversion, And Risk Sharing: Cooperation In A Dynamic Insurance Game
This paper examines how cooperation in an insurance game depends on risk preferences and the riskiness of income. It considers a dynamic game where commitment is limited, and characterizes the level o...
Provided By Hungarian Academy of Sciences
-
A Secure Email System Based on Identity Based Encryption
Now-a-days, email has become the most widely communication way in daily life. The main reason for using email is probably because of the convenience and speed in which it can be transmitted irrespecti...
Provided By Cochin University of Science & Technology
-
Use of Novel Algorithms MAJE4 and MACJER-320 for Achieving Confidentiality and Message Authentication in SSL & TLS
Extensive use of the Internet coupled with the marvelous growth in e-commerce and m-commerce has created a huge demand for information security. The Secure Socket Layer (SSL) protocol is the most wide...
Provided By Cochin University of Science & Technology
-
Performance Examination of AES Encryption Algorithm with Constant and Dynamic Rotation
Lately, the Rijndael algorithm has been standardized by the NIST as the Advanced Encryption Standard (AES). This makes AES an essential and necessary data-protection mechanism for federal agencies in ...
Provided By International Journal of Reviews in Computing
-
A Survey on Security Requirements Engineering
Security engineering is a new research area in software engineering that covers the definition of processes, plans and designs for security. The researchers are working in this area and however there ...
Provided By International Journal of Reviews in Computing
-
SPF Based Selinux Operating System for Multimedia Applications
Trusted Operating Systems, offer a number of security mechanisms that can help protect information, make a system difficult to break into, and confine attacks far better than traditional operating sys...
Provided By International Journal of Reviews in Computing
-
Certification in Electronic Payment Gateway
This paper main aim is on security problems related to electronic payment gateway. This paper addresses the requirement of certification of users and merchants during the process of online transaction...
Provided By International Journal of Reviews in Computing
-
Effect of Different Neural Networks on the Accuracy in Iris Patterns Recognition
A biometric system provides automatic identification of an individual based on a unique feature or characteristic possessed by the individual. Iris recognition is regarded as the most reliable and acc...
Provided By International Journal of Reviews in Computing
-
Confidentiality of Messages in a Cardless Electronic Payment System
In a cardless electronic payment system messages are used instead of credit or debit cards (plastic money). These messages are passed between different entities in order to do electronic transactions ...
Provided By International Journal of Reviews in Computing
-
Ocular Biometric System Focused on Iris Localization and Embedded Matching Algorithm
The term gait recognition is typically used to signify the identification of people in image sequences by the way they walk. Human gait is a valuable biometric cue that can be used for human identific...
Provided By International Journal of Computer and Electrical Engineering (IJCEE)
-
Token-Based Fingerprint Authentication
There are several shortcomings with the traditional token based authentication using magnetic strip card with PIN/password protection such as easy to duplicate and from forgotten to stolen password et...
Provided By Bentham Science Publishers
-
A Novel Human Gait Recognition System
In this paper considering a new human gait recognition system based on Radon transform which gives a high precision recognition rate. Innovation of this paper allocates to feature extraction and usage...
Provided By International Journal of Computer and Electrical Engineering (IJCEE)
-
Parallel-Bit Stream for Securing Iris Recognition
Biometrics-based authentication schemes have usability advantages over traditional password-based authentication schemes. However, biometrics raises several privacy concerns, it has disadvantages comp...
Provided By HELWAN UNIVERSITY
-
Trajectories In Physical Space Out Of Communications In Acquaintance Space: An Agent-Based Model Of A Textile Industrial District
This paper presents an agent-based model of an Italian textile district where thousands of small firms specialize in particular phases of fabrics production. It is an empirical and methodological mode...
Provided By Munich Personal Repec Archive
-
Fair Exchange of Short Signatures without Trusted Third Party
Nowadays it is more and more common to trade digital goods on the web: E-books, software licenses, avatar-games currencies like Ultima Online to cite a few. Whether these goods are exchanged on E-bay ...
Provided By University of Chicago Press
-
How To Make Your Office Refurbishment Sustainable
A major feature of the sustainable office is the amount of natural light available. This doesn't necessarily require a relocation to somewhere with floor-to-ceiling windows to achieve (if you're lucky...
Provided By Morgan Lovell