IT White Papers

IT Security white papers

Analysis of a business orientated trojan

Graham Cluley introduced the Win32/Corkow banking Trojan

Date: 03/06/14

Company: ESET

Download now

Origin of the suspicious

The evolution of misinformation

Date: 03/06/14

Company: ESET

Download now

From BYOD to CYOD

Security Issues with Personal Devices in the Workplace

Date: 02/06/14

Company: ESET

Download now

The end of the XP era

Without a migration plan you could face serious threats

Date: 08/05/14

Company: Citrix

Download now

Unified Data Protection for Physical and Virtual Environments

New business demands require a more agile IT infrastructure

Date: 28/04/14

Company: Symantec

Download now

Internet security threat report 2014

Discover the most important security trends for 2014

Date: 28/04/14

Company: Symantec

Download now

Internet security threat report

The business world is just as vulnerable to attack as ever.

Date: 28/04/14

Company: Symantec

Internet security threat report Download now

How integrated services reduce risk and the impact of a security breach to organisations

Accelerating Incident Response

Date: 31/03/14

Company: Dell SecureWorks

Download now

10 tips to help you minimise the duration and impact of a security breach

Help IT and IT security organisations minimise the duration and impact of a security breach.

Date: 31/03/14

Company: Dell SecureWorks

Download now

7 key questions to ask when selecting an incident response service provider

This paper is designed to help you ask tough, direct questions of any Incident Response services provider to help you determine the vendor’s capabilities

Date: 31/03/14

Company: Dell SecureWorks

Download now


We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open