

DDoS attacks are constantly evolving, both in terms of size as well as sophistication. Not keeping up with the changes in the DDoS attack landscape could leave your business vulnerable to attacks. This paper outlines the top 10 DDoS attack trends.
Published: Mar 17, 2015


This paper will explore how TLS works, best practices for its use, and the various applications in which it can secure business computing
Published: Sep 23, 2014


With the new cloud benefits come new security risks. In the same survey, 50 percent of respondents expressed concerns over cloud security. And 43 percent of respondents who are currently using a cloud computing service reported that they have experienced a data security issue with their cloud service within the last twelve...
Published: Jun 28, 2013


Most companies depend heavily on two or three layers to defend against advanced threats: An initial line of defense at the Internet gateway, plus a second layer on each desktop or server. In many organizations, the layers and vectors of defense are not working together, so each component must be as sophisticated as the...
Published: Sep 18, 2014


The monthly intelligence report, provides the latest analysis of cyber security threats, trends, and insights from the Symantec intelligence team concerning malware, spam, and other potentially harmful business risks.
Published: Dec 17, 2013


Some applications and data require additional security due to rigorous contractual or regulatory requirements. Until now, companies had to store sensitive data (and/or the encryption keys protecting it) in on-premise data centers.
Unfortunately, this either prevented migration of these applications to the AWS cloud...
Published: Nov 04, 2013


An inability to see deep inside its network to determine security weaknesses and other potential concerns prompted Weill Cornell Medical College to seek an intrusion detection system.
The SNORT rules community helped to put Sourcefi re at the top of the pile, but it was the RNA (Real-time Network Awareness) option,...
Published: Sep 04, 2014


In today's world, customers expect or even demand 'instant gratification' from delivered products and services. This forces organisations to constantly look for new ways to improve their ability to respond to these demands, while maintaining a competitive edge in the market - in essence they are always striving...
Published: Jul 24, 2014


Do you know what to look for in an intrusion protection system? Read our e-book, “12 Things Effective Intrusion Protection Systems Should Do.” Don’t leave your organization vulnerable to attacks. The attackers have extremely sophisticated evasion techniques to escape detection.
Does your current...
Published: Nov 20, 2013


Your endpoints are one of the most targeted assets in your organisation. In 2017 alone, more than 50% of organisations experienced a data breach of some kind. A new approach to endpoint security is needed.
According to a recent Forrester study, organisations who replace traditional endpoint security with the CB Predictive...
Published: Jan 16, 2019


Distributed denial-of-service (DDoS) attack types have moved up the OSI network model over time, climbing from network attacks in the 1990s to session attacks and application layer attacks today. Network attacks include DDoS variants such as SYN floods, connection floods, or ICMP fragmentation.
Published: Oct 31, 2013


Few would argue about the importance of endpoint security in any business IT environment. But, for a security solution to be effective it must be easy to deploy and maintain. Some solutions can be so complex to implement that features are either easily misconfigured or not used at all. The less effort involved, the more...
Published: Jul 18, 2016


Email poses the highest risk for accidental data exposure, breaches of privacy, or non-compliance with data protection regulations.
In this whitepaper we’ll help you navigate today’s threats to email security. We’ll explain the obstacles to compliance, and show you why you need a secure email gateway...
Published: Mar 31, 2014


Today, numerous surveys of IT decision makers cite the issue of security and availability as the major impediment to the adoption of cloud computing. After a string of high-profile attacks against financial services companies and online retailers, Internet data centers are increasingly the targets of hackers and cybercriminals...
Published: Sep 15, 2013