91ÖÆÆ¬³§

Tagged - malware

Security Incident Management Plan

Formalize the security incident management program by defining a central, high-level guide to describe goals, roles, and responsibilities, as well as the process that will...

GTB Gets the W-I-N for DLP in 2019

GTB Technologies was recently crowned the winner of Acquisition International’s cyber security award in the DLP category for its anti-malware and insider threat capabilities.

Training Materials – Cyber Attacks

This is one of eight security awareness and training templates that can be used to educate end users on best practices. This presentation focuses on cyber attacks.

Online Advertising: Fertilizer or Waste?

Last week, the technology world waited with breath held while Jack Dorsey took Square through its IPO paces, in what must have been a frightening process - but which the...

Is the Net at Risk?

Anyone paying attention has to be asking the question: Is the Internet today more useful to those intending good, or to those intending harm? For cybertheft, or for...

The Mobile Global Computer

We have just built the world's most powerful computer, but no one has used it yet. What is even more amazing: no one even knows it exists.

Special Letter: Solving the Greatest Enterprise Security Threat

About five years ago, Ray Ozzie, then newly anointed chief software architect at Microsoft, described the world he saw, from a security perspective, and the vision was...

Enterprise Anti-Malware Evaluation & RFP Response Tool

For organizations that have issued a formal Request for Proposal (RFP) to evaluate enterprise anti-malware vendors, gathering and scoring the various responses can be...
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us