• Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us

Sign Up

USA | UK | CA | DE | ES | FR | IT | NL | PL | SE | SG | BR
Lang: CN | EN
Sign Up
main-logo
  • Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us
  • Sign Up
  • Home
  • |
  • IT Security
  • /
  • Disaster Recovery
flow-image
Symantec

Spoofing Server-Server Communication: How You Can Prevent It

Advances in attacks on network security over the last few years have led to many high-profile compromises of enterprise networks and breaches of data security. A new attack is threatening to expand the potential for attackers to compromise enterprise servers and the critical data on them. Solutions are available,...

View More
flow-image
Symantec

Dragonfly Cyberespionage Attacks Against Energy Suppliers

A cyberespionage campaign against a range of targets, mainly in the energy sector, gave attackers the ability to mount sabotage operations against their victims. The attackers, known to Symantec as Dragonfly, managed to compromise a number of strategically important organizations for spying purposes and, if they had...

View More
flow-image
F5 Networks

The DDoS Threat Spectrum

The world is becoming increasingly connected electronically, expanding markets and reducing the inefficiencies of doing business across borders. Services can be hosted anywhere and customers can be served from anywhere as the Third World catches up to the First World's broadband penetration. Emerging market territories...

View More
flow-image
HP

The Bot Threat; HP Whitepaper

Today enterprise networks can be attacked in a number of ways. None are more daunting than the Internet robot or simply, the bot. Bots are malicious code programs that are automated to infect a computer network. They can strike in so many different ways that traditional network security is often ineffective in blocking...

View More
flow-image
Palo Alto Networks

Application Usage and Threat Report

This is the first report of its kind to discuss application usage patterns and the specific type of threat they may or may not introduce. The application and threat patterns observed dispels the position that social networking, filesharing and video applications are the most common threat vectors and it reaffirms...

View More
flow-image
FireEye

A New Security Approach for Today's Advanced Attacks

Organizations face a new breed of cyber attacks that easily thwart traditional defenses. Today’s threat landscape demands a fundamentally new approach, one that does not rely on binary signatures, lists, or rules to detect threats.  Aware that yesterday’s defenses are no match for today’s attacks,...

View More
flow-image
Damballa

Damballa State of Infections Report – Q1 2014

The Damballa Q1 2014 “State of Infections” report investigates the state of the enterprise under attack. It provides context into the behavior of a new generation of threat operators, statistics on the level of infections seen in a typical enterprise, and the steps businesses should take to better prepare themselves....

View More
flow-image
Carbon Black

High Speed SOC Infographic

Your endpoints don’t just live within the safety of your corporate network—they’re out in the wild exposed to millions of new threats every day. With non-malware attacks on the rise that are even harder to detect than traditional malware, security professionals are realising it is no longer a matter of...

View More
flow-image
VMware

How SD-WAN Supports Digital Transformation in Healthcare

Advancements in medicine, the increase in regulations to protect patient and doctor, and the digitization of the entire process requires a scalable, secure, uninterrupted and bandwidth-flexible healthcare IT network. Read this ebook to see how SD-WAN can change your healthcare IT network. 

View More
flow-image
VMware

Creating the Retail Store of the Future with SD-WAN

VMware SD-WAN provides a complete solution for the retail store of the future. Read this eBook to get all the details. 

View More
flow-image
VeriSign

Verisign Distributed Denial of Service Trends Report

This report contains the observations and insights derived from mitigations enacted on behalf of, and in cooperation with, customers of Verisign DDoS Protection Services and the security research of Verisign iDefense Security Intelligence Services. It represents a unique view into the attack trends unfolding online...

View More
flow-image
Carbon Black

8 Experts on Optimizing Your Security Stack

Security teams have a difficult task to perform, and it’s not getting any easier. IT environments are becoming more complex, threats are becoming more sophisticated, and the number of known vulnerabilities is dramatically increasing. In addition, there is a critical shortage of skilled IT security specialists, and...

View More
flow-image
Intel Security

Throughput and Scalability Report

This report summarizes the McAfee 5206's throughput based on the latest version 5.8 software, with various firewall policies applied and different traffic scenarios. The McAfee 5206 was first tested as a single online node in a multi-node cluster, and then the incremental throughput growth achieved by bringing two,...

View More
flow-image
Global Knowledge

Planning a Career Path in Cybersecurity

The field of cybersecurity is growing quickly; so quickly that there are positions sitting open waiting to be filled by qualified individuals. Are you one of those people ready to make a change in your career towards the future? As a society, we have all become heavily dependent on computers, network, and data stores....

View More
  •  
  •  
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • ...
  •  
  •  
Site Map
  • Home
  • Categories
  • Vendors A-Z
  • Latest Whitepapers
  • Contact Us
  • Privacy
technology topics
  • Cloud Computing
  • Data Center
  • Desktop/Laptop OS
  • Email
  • Hardware
  • IT Management
  • IT Security
  • Mobile Computing
  • Network
  • Software
  • Storage
  • Telecommunications
Contact Us

info@headleymedia.com

Call +44 (0) 1932 564999

Contact Us

© Copyright 2022: Headley Media Technology Division Ltd. Company Number: 112774219

We use cookies to improve user experience on our website. If you continue, we'll assume you are happy for your web browser to receive all cookies from our website. See our cookies policy for more information on cookies and how to manage them
close icon