White Papers by Topic: Cyber crime

Resources available: 19

Step Out of the Bull's-Eye

Learn about the evolution of targeted attacks, the latest in security intelligence, and strategic steps to keep your business safe.

Big Data, Big Mess: Sound Risk Intelligence Through Complete Context

This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.

Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk

This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this information to determine which cyber insurance options make the most sense based on your business.

5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain

This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.

Comprehensive Advanced Threat Defense

The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-­based approach to Advanced Threat Defense.

Cybersecurity for Dummies eBook

This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and security best practices

Platfora Big Data Analytics for Network Security

Platfora amplifies the effectiveness of network security analysis, providing Big Data Analytics capability to augment existing security infrastructure for known threats, and advanced analytics capability to identify new threats.

The Total Cost of Email

In this white paper, we'll explore the true costs of fragmented email management and uncover how to reduce those costs with a cloud-based solution for email management.

Who's Spying on You?

You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against businesses by copying sophisticated malware and techniques used to target governments

©1994-2014 Infoworld, Inc.