The mobile workspace has created problems for IT, including policy enforcement, attack from untrusted wireless networks, and physical data theft. This white paper examines how cloud-based security solutions can protect distributed workers.
Published By: VeriSign
Published Date: Feb 10, 2011
This paper will show how code signing works, how attacks can be mounted against unsigned software, (including autoupdate software), and how real-world signing systems protect software vendors, enterprises and end users.
This report examines the new generation of threats, vulnerabilities and attacks, and explores the role that cloud security strategies can play in managing core risks to organizations of all sizes and across all industries.
Published By: SafeNet
Published Date: Sep 08, 2010
This paper will provide insight into the top five threats to the online banking in the financial services industry and SafeNet's recommended solutions for a defense that not only provides a secure transaction environment for customers but also satisfies stringent government and industry compliance regulations.
All enterprises dealing with private data in test environments should mask or generate test data to comply with regulations such as Payment Card Industry (PCI), the Health Insurance Portability and Accountability Act (HIPAA), Sarbanes-Oxley (SOX), and European Union (EU) as well as to protect against internal and external attacks.
Stronger Measures Have Become Essential To Defend Against Growing Attacks. Database security is the last line of defense, so it deserves greater focus on the protection of private data from both internal and external attacks than IT pros have traditionally given it.
Requirements excellence cannot be achieved without first understanding the critical capabilities of requirements maturity, and recognizing your organizations strengths and weaknesses. In order to develop a focused plan of attack, it is necessary to assess your requirements practice in each of six areas: process, technology, staff competency, organization, techniques, and deliverables. You will then be armed with the information you need to identify key improvement opportunities, recognize organizational strengths, and form concrete goals for action.
This paper will discuss the history and progression of the modern Trojan attack. It will explore the methodology used by hackers in selecting a target and developing a compelling attack and will cite several examples of some successful targeted Trojans.
Published By: Webroot UK
Published Date: Mar 22, 2010
This paper considers how Web-based security threats are evolving, within the context of IT trends including mobile, home computing and other forms of remote access that could all potentially increase the attack surface of the organization.
Covering All Points of Attack. As the availability of product and service information on the Internet grows, both the providers and receivers of service have larger networks through which to communicate, interact and transact.
Why all the hype? Is cyberwarfare really something enterprise information security professionals should be concerned about? It's hard to know what the next cyber crisis will be, but here are a few best practices that enterprise security teams should consider to avoid becoming victims.