Sort results by: Published date | Company name

DDoS for Dummies [ Source: Corero ]
October 2012- A Distributed Denial of Service (DDoS) attack against your organization’s network and systems can bring your online business to a grinding halt, costing you hundreds of thousands – even millions – of dollars, ruining your brand, and driving away your customers.

Far too many organizations are ill-prepared to deal with the effects of DDoS attacks and other Internet security threats. They rely on traditional security devices including firewalls, intrusion prevention systems (IPS) and other ...

[WHITE PAPER]
Read Abstract | Go to White Paper

Best Practice Log Management: Correlation is Key [ Source: CorreLog ]
October 2011- Today, collecting email data is a necessity for compliance standards, forensic analysis and managing end-user performance and availability. But making sense of the data is a challenge within itself. Collecting the data is only part of the equation and research and many shops are turning towards correlation which helps bring meaning to the massive amount of data collected. This white paper explains how to establish a systematic approach to identifying relationships (correlating!) between log data ...

[WHITE PAPER]
Read Abstract | Go to White Paper

Coming To An Online Bank Near You [ Source: Checco Services Inc. ]
February 2006- The FFIEC has created an initiative where enterprise e-business is measured not simply by corporate liability but by the protection of the enterprise customer. Although the guidance may be missing a legislative bite, it is prudent for the financial institutions to plan an implementation path for multifactor online authentication within this fiscal year. The use of keystroke biometrics along with proper access control policies, logging, and auditing can create a cost-efficient and truly reasonable solution ...

[WHITE PAPER]
Read Abstract | Go to White Paper

Does Size Matter? The security challenge of the SMB [ Source: McAfee ]
September 2008- Just because a business is small, doesn’t mean it’s immune to security threats. Security challenges facing Small and Medium Businesses in North America are on the rise. For businesses of all sizes, viruses, hacker intrusions, spyware and spam can lead to lost or stolen data, computer downtime, decreased productivity, compliance issues, lost sales and even loss of reputation. According to a recent survey conducted by McAfee, many small and medium sized businesses felt ...

[WHITE PAPER]
Read Abstract | Go to White Paper

The Web Hacking Incidents Database 2008: Annual Report [ Source: Breach Security ]
March 2009- The much anticipated Breach Security Lab’s Web Hacking Incidents Database (WHID) 2008 Annual Report is ready for download. The WHID project is dedicated to maintaining a record of web application-related security incidents. The WHID’s purpose is to serve as a tool for raising awareness of web application security problems and provide information for statistical analysis of web application security incidents. This year the report findings prove that no company or market sector is immune ...

[WHITE PAPER]
Read Abstract | Go to White Paper

Ovum Technology Audit: Arbor Pravail DDoS Protection Solution [ Source: Arbor Networks ]
August 2011- As the size, frequency and complexity of distributed denial of service (DDoS) attacks increase, data center security and availability are quickly becoming top business concerns. Yet, traditional security products such as firewalls and intrusion prevention systems (IPS) are inadequate when it comes to stopping today's complex, multi-faceted DDoS attacks.

Arbor Networks, a leading network security company, recently introduced the Pravail - Availability Protection System (APS) - focused specifically on securing enterprises and the ...

[WHITE PAPER]
Read Abstract | Go to White Paper

US Military Prevents Zero Day Attack with Application Whitelisting [ Source: Bit9 ]
August 2010- The US government is under constant attack from adversaries looking to breach and gain access to their systems. To ultimately ensure they have the best possible endpoint protection, the US military engages in staged cyber security challenges.

During a recent exercise, this US military command center discovered serious vulnerabilities in their existing security solutions.

Despite being on high alert, personnel accidentally introduced malicious malware that immediately broke through all the command ...

[CASE STUDY]
Read Abstract | Go to Case Study