Facebook iconTwitter icon
B2B-Network:
Whitepaper
Title
Client
Date
Analysis of a Cybercrime Infrastructure

Proofpoint security researchers have published an analysis that exposes the inner workings of a cyberc...
Proofpoint Email Solutions GmbH
2014-12-15
Are You Fully Prepared to Withstand DNS Attacks?

Close the DNS Security Gap with Comprehensive Threat Protection Since 2012, the number of infrastr...
INFOBLOX Inc.
2014-11-13
Achieve business continuity and keep people productive with remote access

Best practices, technologies and real-word examples to protect your business from disruptions.
Citrix Systems GmbH
2014-11-12
Zmienianie zabezpieczeń w sukces handlowy

Chcielibyśmy pokazać, jak technologia SSL może pomóc nowo powstałej firmie w rozwinięciu działaln...
Symantec UK Ltd
2014-10-27
Luki w zabezpieczeniach, które mogą zaszkodzić witrynie

W 2012 roku firma Symantec każdego dnia wykonywała ponad 1400 operacji skanowania witryn internetowyc...
Symantec UK Ltd
2014-10-27
Phishing – The latest tactics and potential business impacts

As one of the top cybercrime ploys impacting both consumers and businesses, phishing has remained a co...
Symantec UK Ltd
2014-10-27
The Imperative for Effective Data Flow Governance in Response to Data Security, Risk Mitigation, and Compliance Requirements

Ovum Studie: So reduzieren Sie das Risiko von Datenlecks Im Rahmen einer Studie der Analysten von ...
Axway GmbH
2014-10-23
2014 Authentication Survey - Executive Summary

How Organisations Are Responding to Mobile and Cloud Threats As IT teams seek to keep sensitive ass...
SafeNet UK Ltd
2014-10-17
Multi-Factor Authentication - Current Usage and Trends

In the wake of continuing breaches, it is abundantly clear that governing access to corporate resource...
SafeNet UK Ltd
2014-10-17
Loader