Sort results by: Published date | Company name

Dennis Technology Labs - Effectiveness in Virtual Environments [ Source: Symantec ]
October 2012- This report from Dennis Technology Labs compares the effectiveness of anti-malware products designed to run in virtual desktop environments. This test aims to compare the effectiveness of the most recent releases of anti-malware products designed to run in virtual desktop environments.

[WHITE PAPER]
Read Abstract | Go to White Paper

Cybersecurity in Action [ Source: Guidance Software ]
October 2012- 4 Days, 465 Systems, 3 continents

The Zeus Trojan virus was destructive enough, but the tech media are constantly alerting us to evolving threats to every industry. The good news is that you can transform the way your organization exposes, analyzes, and respond to advanced endpoint threats and errant sensitive data.

Here are seven quick case studies to prove it. Download these real-world examples of how customers in industries such as financial services, hospitality, ...

[WHITE PAPER]
Read Abstract | Go to White Paper

Achieving Compliance in Digital Investigations [ Source: Guidance Software ]
October 2012- 80% of organizations suffering payment card breaches had not achieved compliance with PCI DSS at the time of the breach. – Verizon 2011 Data Breach Investigation Report

As regulation and litigation increase, internal investigators must support an alphabet soup of compliance obligations: SOX, GLBA, FISMA, HIPAA, PCI DSS, regional privacy laws, and more. Although each regulation is different, these laws share common investigation requirements in three areas: policy, control infrastructure, and incident response.

This ...

[WHITE PAPER]
Read Abstract | Go to White Paper

How Three Cyber Threats Transform the Role of Incident Response [ Source: Guidance Software ]
October 2012- “The theft began with an instant message sent to a Google employee in China who was using Microsoft’s Messenger program… Ultimately, the intruders were able to gain control of a software repository used by the development team.” - New York Times - Cyberattack on Google Said to Hit Password System

While we still use many of the same old names - viruses, Trojans, and worms - today’s malware enables potent multistage ...

[WHITE PAPER]
Read Abstract | Go to White Paper

Finding An Effective Antivirus Solution To Please Users & Administrators [ Source: ESET ]
October 2012- Does your anti-virus bring your systems to a crawl? Is it causing administrators to pull their hair out? This whitepaper shows you how to solve both problems with one product!

[WHITE PAPER]
Read Abstract | Go to White Paper

Options for Backing Up Your Computer [ Source: ESET ]
July 2012- While personal computers range in cost from a few hundred to a few thousand dollars, a computer is a physical object, and it can be replaced. What really makes your computer valuable is what's unique about it, and that is your data - your business records, pictures, audio and video recordings, and documents you have saved over the years. Read to learn more about how to keep your data safe.

[WHITE PAPER]
Read Abstract | Go to White Paper

Keeping Secrets: Good Password Practice [ Source: ESET ]
July 2012- Alternative and supplementary forms of authentication have become far more common (and affordable), but the humble password remains the somewhat crumbling gatehouse to many a security structure. Learn how to tighten the weakest link of your security system.

[WHITE PAPER]
Read Abstract | Go to White Paper

Ten Ways To Dodge CyberBullets: Reloaded [ Source: ESET ]
July 2012- In the frequently changing threat landscape, as cyber-criminals and security companies constantly introduce new techniques and countermeasures, the basic principles of self-defense stay the same, so even while detail changes, the underlying advice remains critical to protection.

[WHITE PAPER]
Read Abstract | Go to White Paper

Trends for 2012: Malware Goes Mobile [ Source: ESET ]
July 2012- The ways in which people are accustomed to using technology have always influenced and determined malware development and that trend will continue. With the significant growth in the use of mobile devices, malware developers have been working to make these platforms a viable entry point for malicious code infection.

[WHITE PAPER]
Read Abstract | Go to White Paper

The 5 New Laws of Anti-Malware [ Source: Sourcefire ]
July 2012- Malware has changed considerably since the early PC viruses first introduced more than 25 years ago. Today, it evolves so quickly that many customers find it nearly impossible to stay ahead of the latest threat.

If the explosion in malware variants wasn't enough, sophisticated Client Side Attacks and Advanced Persistent Threats (APT's) target victims in ways that completely evade traditional security measures.

Current research suggests as much as 75% of new viruses are ...

[WHITE PAPER]
Read Abstract | Go to White Paper
View All