Your Search returned 2 results from our Editorial content

Sort By
  • Close-button

    IT Security Frameworks and Standards


London Tech Week: Should we teach kids ethical hacking?...

Industry representatives discuss the impact of cybercrime on companies and what needs to be done.


Your Search returned 57 results from our White Paper Library

Sort By
  • Close-button

    IT Security Frameworks and Standards

Acronis Software

Disk Backups

Beware of Hidden Costs of Virtualization

Checkout the benefits of virtualization and master the tricks of planning a perfect virtualization project. Gain tips on intelligent budgeting to handle...

Juniper Networks

Networking & Communications

Discover the Power of One Operating System

Discover how to reduce Complexity, Achieve Operational Excellence, and Dynamically Deliver Services with Lower total cost of ownership (TCO). This whitepaper...

Symantec Corporation


Norton Cybercrime Report 2011

431 million people around the world become victims of cybercrime every year. This report reveals the latest stats from around the world, with a tailored...


10 Things You Have to do Today to Protect Your Business...

Cloud computing, consumerization, tablets and social media are but a few of the changes challenging traditional IT and security. Discover the 10 things...



10 Steps For Early Incident Detection

Why are there so many stories of companies suffering cyber-attacks in the media? Most aren’t discovered until a third party reports them, usually weeks...



IBM X-Force 2013 Mid-Year Trend and Risk Report

Read this report for an in-depth analysis of the latest security threats and trends.


Mobile Device Management

A 3-Step Plan For Mobile Security

This paper provides a three step plan to establish a mobile security strategy that encompasses both corporate and personal devices.

Symantec Corporation

Change Management

Best Practices for Implementing a Security Process

This paper looks at aligning security processes, the human element of security, with the latest security technologies – creating a secure barrier against...

Symantec Corporation

Application Security

The Vulnerability Gap: Website Security Risks In The Asia...

Featuring survey results of 100 senior IT executives in Japanese enterprises, this paper analyses the gap between perceptions of Web security and the reality....



The Unwitting Danger Within Understanding and Mitigating...

This eBook from Rapid7explores the different kinds of user-based risks in today's corporate environment.

Previous 1 3 4 5 6

Most Recent Comments


Resource Center

  • /view_company_report/1541/a10-networks
  • /view_company_report/775/aruba-networks
  • /view_company_report/1450/bit9-carbon-black
  • /view_company_report/624/interactive-intelligence
  • /view_company_report/1219/jama-software
  • /view_company_report/661/kaseya
  • /view_company_report/506/qualys
  • /view_company_report/391/silver-peak-systems
  • /view_company_report/2095/simply-hired
  • /view_company_report/419/splunk
  • /view_company_report/1352/tegile-systems


Does Altruistic Malware introduce more risk despite good intentions?