• January 26, 2007 26 Jan'07

    Attacks targeted to specific applications

    This is the fourth tip in our series, "How to assess and mitigate information security threats," excerpted from Chapter 3: The Life Cycle of Internet Access Protection Systems of the book "The Shortcut Guide to Protecting Business Internet Usage," ...  Continue Reading

  • January 26, 2007 26 Jan'07

    Malware: The ever-evolving threat

    The first tip in our series, "How to assess and mitigate information security threats, excerpted from Chapter 3: The Life Cycle of Internet Access Protection Systems of the book The Shortcut Guide to Protecting Business Internet Usage published by ...  Continue Reading

  • January 26, 2007 26 Jan'07

    Information theft and cryptographic attacks

    The third tip in our series, "How to assess and mitigate information security threats," excerpted from Chapter 3: The Life Cycle of Internet Access Protection Systems of the book The Shortcut Guide to Protecting Business Internet Usage published by ...  Continue Reading

  • January 26, 2007 26 Jan'07

    Network-based attacks

    The second tip in our series, "How to assess and mitigate information security threats," excerpted from Chapter 3: The Life Cycle of Internet Access Protection Systems of the book The Shortcut Guide to Protecting Business Internet Usage published ...  Continue Reading

  • January 26, 2007 26 Jan'07

    Threats to physical security

    This is tip No. 6 in our series, "How to assess and mitigate information security threats," excerpted from Chapter 3: The Life Cycle of Internet Access Protection Systems of the book "The Shortcut Guide to Protecting Business Internet Usage" ...  Continue Reading

  • January 26, 2007 26 Jan'07

    How to assess and mitigate information security threats

    Learn how to assess and mitigate information security threats, like rootkits, worms and Trojans in the tip series created in collaboration with Realtimepublishers and Dan Sullivan, author of The Shortcut Guide to Protecting Business Internet Usage.  Continue Reading

  • January 25, 2007 25 Jan'07

    Quiz: Defending mobile devices from viruses, spyware and malware

    Test your understanding of the content presented in Defending mobile devices from viruses and malware lesson of SearchSecurity.com's Messaging Security School.  Continue Reading

  • January 25, 2007 25 Jan'07

    Expanding antivirus to include the mobile enterprise

    If your organization has yet to add mobile devices to its antivirus management strategy, it may be overlooking a tempting attack vector. As Sandra Kay Miller explains, it's not only necessary that PDAs, smartphones and other mobile devices have ...  Continue Reading

  • January 25, 2007 25 Jan'07

    Countdown: Top 5 mobile spyware misconceptions

    This 10-12 minute podcast will count down the top 5 things people may falsely believe or not know about mobile spyware.  Continue Reading

  • January 25, 2007 25 Jan'07

    How is ISO 17799 different from SAS 70?

    In today's security world, it's hard to keep track of each and every management standard and auditing procedure. In this SearchSecurity.com Q&A, security management expert Shon Harris reveals the differences between ISO 17799 and SAS 70.  Continue Reading

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close