Neil Roiter, Sep 20, 2011
Vulnerability management identifies and closes exploitable holes in your enterprise network. But some systems remain vulnerable, and traditional antivirus and perimeter defenses are proving less effective against sophisticated malware, targeted attacks and zero-day exploits. In this report, we show you how malware analysis, tied closely to incident response, is an essential complement to enterprise vulnerability management programs.
| Read Report » | 630 KB
Neil Roiter, Jun 13, 2011
Small and midsize businesses are falling prey to cyberattacks that cost them sensitive data, productivity and corporate accounts cleaned out by sophisticated banking Trojans. SMBs are typically on the hook for these losses and lack effective means to prevent them. We explain what makes these threats so menacing, and share best practices to defend against them.
| Read Report » | 2 MB
Neil Roiter, Jun 19, 2010
Cloud computing is still in its infancy, but the buzz from business executives, IT professionals and industry analysts is all about how it will change the way we work and do business. In this report, we analyze the results of our poll of more than 800 information technology pros and explain how to adapt to this new paradigm while providing maximum value to your company.
| Read Report » | 1 MB