EGUIDE:
With cyber threats and attacks making headlines almost every day, governments and enterprises in Southeast Asia are placing greater emphasis on shoring up their cyber defenses, more so as they transform their economies digitally.
EGUIDE:
This article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.
WHITE PAPER:
E-mail threats evolve daily. Read this guide to learn the challenges of implementing an email security solution and administrative considerations to make when evaluating potential email security solutions.
WHITE PAPER:
This report describes the anatomy of web based attacks and examines some of the factors that have influenced a shift toward this type of attack over the last year.
PRESENTATION TRANSCRIPT:
This document describes the risks of the new Underground Economy, phishing types, malware and how to combat phishing exploitation.
WEBCAST:
Safeguarding your data from malware and other Web threats takes a layered approach. In this TechTalk webinar Blue Coat Technical Marketing Engineers will lead a discussion on how the Blue Coat ProxyAV works with the ProxySG to create a community-watch based security.
TRIAL SOFTWARE:
Symantec Protection Suite creates a protected endpoint and messaging environment that is secure against today's complex malware, data loss and spam threats, and is quickly recoverable in the event of failure.
PRESENTATION TRANSCRIPT:
Read this paper to learn more about the current state of security and identity management. The presenters discuss solutions related to enterprise security issues and the benefits of Oracle products.
WHITE PAPER:
This paper provides an overview of how teleworking helps meet today's productivity demands. It discusses additional network security risks that anywhere access can create, and how SonicWALL addresses these concerns while offering additional benefits.
WHITE PAPER:
Network Access Control solutions are immature, with complex integration, inadequate inspection capabilities, and weak policy management. Read this white paper to learn how SSL VPNs allow for an effective dose of NAC with far fewer complicat...