White Papers by Topic: Security

Resources available: 312

DDoS Infographic: How Are Attacks Evolving?

For the third consecutive year, Neustar surveyed businesses across major industries to track the evolution of DDoS attacks. Are they more frequent? Larger? What new tactics are criminals employing? See this infographic for clues.

Three Ways Your DNS Can Impact DDoS Attacks

Domain Name System (DNS) plays a big role in consumers' day-to-day Internet usage and is a critical factor when it comes to distributed denial-of-service (DDoS) attacks. Learn three ways your DNS can have an impact on DDoS attacks.

Network Transformation: A Guide to Planning Your Journey to All-IP

This guide can help you connect the dots as you plan your transformation. Get a deeper understanding of the major impact points, considerations and dependencies while building a strategy to maximize results and ROI.

Evaluating File Sync and Share Solutions: 12 Questions to Ask about Security

File sync and share can increase productivity, but how do you pick a solution that works for you? Download to learn some important questions to ask file sync and share vendors about security.

The Truth About Cloud Security

"Security" is the number one issue holding business leaders back from the cloud. But does the reality match the perception?

Top 10 Reasons to Strengthen Information Security with Desktop Virtualization

Explore ten reasons why virtual desktops should be the foundation of your layered approach to information security.

Find Out How Vulnerable Your Industry is to CyberAttack

Many consumers are still unaware that over 95% of the data breaches start with a phishing email.

Understanding DMARC for Securing Email Channels

Learn more about how DMARC is combined with existing authentication technologies to create secure email channels, and provide receivers with clear directives on how to safely dispose of unauthorized email - all at Internet scale.

Using Big Data to Fight the Battle Against Phishing and Fraudulent Emails

Learn how Agari's cloud-based solution can guarantee rejection of phishing messages across the Internet to protect your brand, reduce your liability and enhance your consumer trust.

It's Not Them, It's You: How Customer Experience Impacts Your Identity and Access Management Practices

Customers want more online access, but they also want to do less to get there: more mobility with less hassle. More security, but less time spent signing on. Where does that leave you and your identity and access management (IAM) practices?

©1994-2014 Infoworld, Inc.