We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

IT White Papers

Security white papers

Lifecycle of an advanced persistent threat (APS)

Good architecture can help with controlling data flows

Date: 31/03/14

Company: Dell

Download now

Prescribing enhanced security and worldwide compliance

Pharmaceutical firm in the UK expands business and meets complex international compliance regulations with 24/7 in-depth security

Date: 31/03/14

Company: Dell

Download now

Cybercrime survival guide

Almost 400 million people fall victim to cybercrime every year, don't be one of them

Date: 25/03/14

Company: Symantec

Download now

12 things effective intrusion prevention systems (IPS) should do

Making the right choice in selecting an intrusion prevention system

Date: 18/03/14

Company: Dell

Download now

Anti-Evasion: Why It’s a Critical Component of Intrusion Prevention Systems

Sophisticated exploits that utilize advanced evasion techniques are all too common

Date: 18/03/14

Company: Dell

Download now

5 Things You Didn't Know About Cloud Backup

Data privacy can easily be compromised by encryption key holders

Date: 13/03/14

Company: Druva

Download now

Managed Security Services and Incident Response

Discover how integrated services reduce risk and the impact of a security breach to organisations

Date: 12/03/14

Company: Dell

Download now

A CIO perspective: managing the 2014 cyber threat

What CIOs can do in 2014 to protect their business

Date: 10/03/14

Company: Websense

A CIO perspective: managing the 2014 cyber threat Download now

7 Must Haves for Mobile App Security

Mobile devices are not just another type of endpoint.

Date: 21/02/14

Company: Good Technology

Download now

In a BYOD world, MDM is not enough

Discover why a solution approach to Secure mobility is needed

Date: 21/02/14

Company: Good Technology

Download now


ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open