• Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us

Sign Up

USA | UK | CA | DE | ES | FR | IT | NL | PL | RU | SE | SG | BR
Sign Up
main-logo
  • Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us
  • Sign Up
  • Home
  • |
  • IT Security
flow-image
VeriSign

Verisign Distributed Denial of Service Trends Report

This report contains the observations and insights derived from mitigations enacted on behalf of, and in cooperation with, customers of Verisign DDoS Protection Services and the security research of Verisign iDefense Security Intelligence Services. It represents a unique view into the attack trends unfolding online...

Published: Jun 20, 2014
View More
flow-image
Malwarebytes

Board Ready Endpoint Resilience in 5 Steps

At the heart of every organization are its employees, the engine that drives growth, fueled by the data they create and store on their laptops, tablets, and mobile phones, as well as access through data center and cloud servers.  Establishing endpoint resilience minimizes the impact of a cyberattack and restores...

Published: Sep 04, 2019
View More
flow-image
Arbor Networks

DDoS Mitigation Best Practices

Organizations are becoming increasingly aware of the threat that Distributed Denial of Service (DDoS) attacks can pose to the availability of any on-line services which they offer. Now, if an organization offers on-line services to customers, employees or business partners then they are open to attack. And, unfortunately...

Published: Oct 07, 2013
View More
flow-image
McAfee

Corporate AV /EPP Comparative Analysis - Exploits Evasion Defences

Cyber criminals do not just develop one attack and then abandon it after one use. Rather, they seek to make their software usable for as long as possible. Evasion techniques allow known threats to circumvent detection by security products. Research indicates that cyber criminals perform their own testing and make...

Published: Nov 15, 2013
View More
flow-image
AlienVault

451 Group Report: AlienVault USM - A Security Operations Center for the SMB

AlienVault's USM is tailor-made for the needs of the security-savvy SMB. This analyst report reviews AlienVault's SMB-focused approach to SIEM and discusses the competitive landscape.

Published: Jul 16, 2014
View More
flow-image
FireEye

A New Security Approach for Today's Advanced Attacks

Organizations face a new breed of cyber attacks that easily thwart traditional defenses. Today’s threat landscape demands a fundamentally new approach, one that does not rely on binary signatures, lists, or rules to detect threats.  Aware that yesterday’s defenses are no match for today’s attacks,...

Published: Feb 28, 2014
View More
flow-image
VMware

How SD-WAN Supports Digital Transformation in Healthcare

Advancements in medicine, the increase in regulations to protect patient and doctor, and the digitization of the entire process requires a scalable, secure, uninterrupted and bandwidth-flexible healthcare IT network. Read this ebook to see how SD-WAN can change your healthcare IT network. 

Published: Aug 06, 2020
View More
flow-image
Fortinet

Advanced Threat Protection Framework

In 2014, sophisticated attacks yielded big rewards for cybercriminals. In 2015 we expect to see cyber criminals, fueled by the success of high profile hacks, continue to innovate with an even greater focus on deceiving and evading existing security solutions. As attacks continue to become more advanced, so must the security...

Published: Jun 30, 2014
View More
flow-image
Lumension

Beyond Compliance: Combating Threats with Endpoint Configuration Management

The risks to organizations are more dangerous than ever as attackers focus their efforts on the endpoint. In the past couple years we have seen well known businesses suffer huge losses of intellectual property and goodwill because of attacks that began at the endpoint. As these risks continue to rise, regulators are responding...

Published: May 09, 2013
View More
flow-image
Carbon Black

10 Endpoint Security Problems Solved By The Cloud Infrographic

The three challenges you’re likely facing – cost and complexity, defenses that can’t keep up, and overburdened staff – drive ten real and tangible problems that require lots of time and resources. Endpoint security is a challenge. Defenses aren’t keeping up, and security staff is stretched...

Published: Jan 11, 2019
View More
flow-image
F5 Networks

Mitigating DDoS Attacks with F5 Technology

Distributed denial-of-service (DDoS) attack types have moved up the OSI network model over time, climbing from network attacks in the 1990s to session attacks and application layer attacks today. Network attacks include DDoS variants such as SYN floods, connection floods, or ICMP fragmentation. 

Published: Oct 31, 2013
View More
flow-image
FireEye

New Security Challenges for State and Local Governments

In the new era of cyber warfare, states, cities, and towns are directly in the cross hairs. A new breed of cyber attacks is targeting critical infrastructure, key services, and personal data on public employees and citizens. As a result, cyber security has never been so critical for state and local governments. But...

Published: Mar 05, 2014
View More
flow-image
HP

Cost of Cyber Crime Study: Germany

Ponemon Institute’s  2014 Cost of Cyber Crime  study finds cyber attacks cost the average U.S. company $12.7 million with some surveyed companies experiencing losses up to $61 million. That’s up more than 9 percent over last year. Businesses in other countries are close behind. Download these...

Published: Dec 10, 2013
View More
flow-image
Kaspersky

Who's Spying on You?

In this report, Kaspersky Lab’s cybersecurity experts give you an insight into: • How businesses can suffer from direct – and indirect – cyber-espionage attacks • What you can do to protect your business… and its hard-won reputation • How specific technologies can...

Published: Feb 20, 2014
View More
  •  
  •  
  • ...
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • ...
  •  
  •  
Site Map
  • Home
  • Categories
  • Vendors A-Z
  • Latest Whitepapers
  • Contact Us
  • Privacy
technology topics
  • Cloud Computing
  • Data Center
  • Desktop/Laptop OS
  • Email
  • Hardware
  • IT Management
  • IT Security
  • Mobile Computing
  • Network
  • Software
  • Storage
  • Telecommunications
Contact Us

info@headleymedia.com

Call +44 (0) 1932 564999

Contact Us

© Copyright 2021: Headley Media Technology Division Ltd. Company Number: 112774219

We use cookies to improve user experience on our website. If you continue, we'll assume you are happy for your web browser to receive all cookies from our website. See our cookies policy for more information on cookies and how to manage them
x