• Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us

Sign Up

USA | UK | CA | DE | ES | FR | IT | NL | PL | RU | SE | SG | BR
Sign Up
main-logo
  • Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us
  • Sign Up
  • Home
  • |
  • Mobile Security
flow-image
Imperva

Top 10 DDoS Attack Trends

DDoS attacks are constantly evolving, both in terms of size as well as sophistication. Not keeping up with the changes in the DDoS attack landscape could leave your business vulnerable to attacks. This paper outlines the top 10 DDoS attack trends. 

Published: Mar 17, 2015
View More
flow-image
Symantec

Best Practices and Applications of TLS/SSL

This paper will explore how TLS works, best practices for its use, and the various applications in which it can secure business computing

Published: Sep 23, 2014
View More
flow-image
Trend Micro

Securing Your Journey to the Cloud with Data Protection

With the new cloud benefits come new security risks. In the same survey, 50 percent of respondents expressed concerns over cloud security. And 43 percent of respondents who are currently using a cloud computing service reported that they have experienced a data security issue with their cloud service within the last twelve...

Published: Jun 28, 2013
View More
flow-image
McAfee

Deny and Defuse Designer Threats

Most companies depend heavily on two or three layers to defend against advanced threats: An initial line of defense at the Internet gateway, plus a second layer on each desktop or server. In many organizations, the layers and vectors of defense are not working together, so each component must be as sophisticated as the...

Published: Sep 18, 2014
View More
flow-image
Symantec

Symantec Intelligence Report: NOVEMBER 2013

The monthly intelligence report, provides the latest analysis of cyber security threats, trends, and insights from the Symantec intelligence team concerning malware, spam, and other potentially harmful business risks.

Published: Dec 17, 2013
View More
flow-image
SafeNet

Securing Sensitive Workloads in the AWS Cloud

Some applications and data require additional security due to rigorous contractual or regulatory requirements. Until now, companies had to store sensitive data (and/or the encryption keys protecting it) in on-premise data centers. Unfortunately, this either prevented migration of these applications to the AWS cloud...

Published: Nov 04, 2013
View More
flow-image
Sourcefire

Weill Cornell Medical College - SANS WhatWorks in Intrusion Prevention and Detection

An inability to see deep inside its network to determine security weaknesses and other potential concerns prompted Weill Cornell Medical College to seek an intrusion detection system. The SNORT rules community helped to put Sourcefi re at the top of the pile, but it was the RNA (Real-time Network Awareness) option,...

Published: Sep 04, 2014
View More
flow-image
Symantec

Achieving Business Agility Through an Agile Data Center

In today's world, customers expect or even demand 'instant gratification' from delivered products and services. This forces organisations to constantly look for new ways to improve their ability to respond to these demands, while maintaining a competitive edge in the market - in essence they are always striving...

Published: Jul 24, 2014
View More
flow-image
Dell

12 Things Effective Intrusion Prevention Systems Should Do

Do you know what to look for in an intrusion protection system? Read our e-book, “12 Things Effective Intrusion Protection Systems Should Do.”  Don’t leave your organization vulnerable to attacks. The attackers have extremely sophisticated evasion techniques to escape detection. Does your current...

Published: Nov 20, 2013
View More
flow-image
Carbon Black

The Total Economic Impactâ„¢ Of The CB Predictive Security Cloud

Your endpoints are one of the most targeted assets in your organisation. In 2017 alone, more than 50% of organisations experienced a data breach of some kind. A new approach to endpoint security is needed. According to a recent Forrester study, organisations who replace traditional endpoint security with the CB Predictive...

Published: Jan 16, 2019
View More
flow-image
F5 Networks

Mitigating DDoS Attacks with F5 Technology

Distributed denial-of-service (DDoS) attack types have moved up the OSI network model over time, climbing from network attacks in the 1990s to session attacks and application layer attacks today. Network attacks include DDoS variants such as SYN floods, connection floods, or ICMP fragmentation. 

Published: Oct 31, 2013
View More
flow-image
Sophos

Sophos Endpoint Protection & Sophos Cloud Endpoint Protection

Few would argue about the importance of endpoint security in any business IT environment. But, for a security solution to be effective it must be easy to deploy and maintain. Some solutions can be so complex to implement that features are either easily misconfigured or not used at all. The less effort involved, the more...

Published: Jul 18, 2016
View More
flow-image
Sophos

Who's Snooping on Your Email?

Email poses the highest risk for accidental data exposure, breaches of privacy, or non-compliance with data protection regulations. In this whitepaper we’ll help you navigate today’s threats to email security. We’ll explain the obstacles to compliance, and show you why you need a secure email gateway...

Published: Mar 31, 2014
View More
flow-image
Arbor Networks

Five Tips for Securing Your Data Center

Today, numerous surveys of IT decision makers cite the issue of security and availability as the major impediment to the adoption of cloud computing. After a string of high-profile attacks against financial services companies and online retailers, Internet data centers are increasingly the targets of hackers and cybercriminals...

Published: Sep 15, 2013
View More
  •  
  •  
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • ...
  •  
  •  
Site Map
  • Home
  • Categories
  • Vendors A-Z
  • Latest Whitepapers
  • Contact Us
  • Privacy
technology topics
  • Cloud Computing
  • Data Center
  • Desktop/Laptop OS
  • Email
  • Hardware
  • IT Management
  • IT Security
  • Mobile Computing
  • Network
  • Software
  • Storage
  • Telecommunications
Contact Us

info@headleymedia.com

Call +44 (0) 1932 564999

Contact Us

© Copyright 2021: Headley Media Technology Division Ltd. Company Number: 112774219

We use cookies to improve user experience on our website. If you continue, we'll assume you are happy for your web browser to receive all cookies from our website. See our cookies policy for more information on cookies and how to manage them
x