Your Search returned 1431 results from our Editorial content

Sort By

SECURITY

5 security practices hackers say make their lives harder...

Hackers believe no password is safe from a determined attacker, but they agree that five key security measures can make it a lot harder to penetrate enterprise networks....

SECURITY

Mozilla launches free website security scanning service...

Mozilla has built an online scanner that can check if websites have the best security settings in place.

   

SECURITY

Quotes of the week: “Apple is the NSA of AI.”

Some of the best quotes from the tech industry this week

SECURITY

Dropbox prompts certain users to change their passwords...

Dropbox is asking users who signed up before mid-2012 to change their passwords if they haven’t done so since then.

   

SECURITY

Apple patches iOS security flaws found in spyware targeting...

To spy on a human rights activist, government hired hackers may have gone as far to use three previously unknown vulnerabilities in Apple’s iOS.

SECURITY

Apple patches iOS against potent zero-day spyware attack...

Apple is issuing patches for three iOS zero-day vulnerabilities known as Trident that have been exploited for years by an Israel-based spyware vendor against a human...

   

SECURITY

So your company’s been hacked: How to handle the aftermath...

Education and planning are key, cyber-security expert Tyler Cohen Wood says.

SECURITY

Cisco starts patching firewall devices against NSA-linked...

Cisco Systems has started releasing security patches for a critical flaw in Adaptive Security Appliance (ASA) firewalls targeted by an exploit linked to the U.S....

   

SECURITY

New collision attacks against triple-DES, Blowfish break...

Legacy ciphers such as triple-DES and Blowfish are vulnerable to Sweet32 attacks, which let attackers decrypt HTTPS sessions even without the encryption key

SECURITY

Facebook, Google, Twitter lax on terrorists’ misuse of their...

A panel of U.K. lawmakers has described as “alarming” that social networking companies like Facebook, Twitter and Google's YouTube have teams of only a few hundred...

   
   
Previous 1 3 4 5 143 144

Your Search returned 358 results from our White Paper Library

Sort By
McAfee

Managed Services

Secure in 15 — Start with Daily Practices

Get the Secure in 15 toolkit starting with the “15 Minutes Month-at-a-Glance” calendar. McAfee will send you additional tools and tricks to stay protected...


McAfee

Managed Services

McAfee Total Protection for Secure Business

Secure your business across systems, email, web, and data—all with one affordable solution created for the midsize organization.


McAfee

Managed Services

A Buyer’s Guide to Data Protection

Implementing data protection products and processes can be daunting. Make the right decisions by exploring what is available and what makes sense for your...


McAfee

Managed Services

Hands-On or Hosted Security: The Choice Is Yours

Do you manage security on premises or with Security-as-a-Service? Learn about the benefits of each approach, and get an overview of your options in this...


McAfee

Security

McAfee Email and Web Security Appliance Trial

15% better malware detection rate and 20% better spam and phishing catch rate—simply more effective than other filters. If that sounds like something you...


Meru Networks

WLAN

Security: Multiple Lines of Defense

To understand the unique vulnerabilities of wireless networks, it is necessary to analyze threats from the enterprise perspective. Wireless security vulnerabilities...


Admit One Security

Security

Eliminating Costs of Strong Authentication for Juniper SSL...

Minimizing the Costs of Strong Authentication for Juniper SSL VPN's.  Hear industry experts break down the authentication challenges that organizations...


Altor Networks

Virtualization

Alternatives for Securing Virtual Networks

Discover the next generation security solution for the virtual environment. Check out how Altor VF monitors and controls inter-VM traffic, enforcing security...


Symantec Corporation

Security

Data Loss Risks During Downsizing

Are departing employees walking away with your company’s sensitive and confidential data?  In today’s economic environment a significant number of professionals...


Previous 1 3 4 5 35 36

Blogs

phil-muncaster

China Rising

The South China Sea: A new hacking hotspot

Phil Muncaster reports on China and beyond

mark-chillingworth

CIO Watch

Losing CIOs to startups could be costly

Mark Chillingworth on IT leadership

jon-collins

Thinking Different

Can technology save a post-Brexit Britain?

Jon Collins’ in-depth look at tech and society

Most Recent Comments

Resource Center

  • /view_company_report/775/aruba-networks
  • /view_company_report/419/splunk

Poll

Crowdfunding: Viable alternative to VC funding or glorified marketing?