1

The miners strike – addressing the crypto-currency threat to enterprise networks

Year:
2018
Language:
english
File:
PDF, 1.75 MB
english, 2018
2

Plugging IT/OT vulnerabilities – part 1

Year:
2018
Language:
english
File:
PDF, 1.80 MB
english, 2018
3

Locking down the e-wallet

Year:
2012
Language:
english
File:
PDF, 569 KB
english, 2012
4

Hacktivism goes hardcore

Year:
2015
Language:
english
File:
PDF, 1.31 MB
english, 2015
5

Spear-phishing: how to spot and mitigate the menace

Year:
2013
Language:
english
File:
PDF, 843 KB
english, 2013
6

Plugging the cyber-security skills gap

Year:
2013
Language:
english
File:
PDF, 1.69 MB
english, 2013
7

Making security awareness training work

Year:
2016
Language:
english
File:
PDF, 1.55 MB
english, 2016
8

Smart security

Year:
2011
Language:
english
File:
PDF, 391 KB
english, 2011
9

Ethical hackers: putting on the white hat

Year:
2011
Language:
english
File:
PDF, 183 KB
english, 2011
10

Prepare to fail: creating an incident management plan

Year:
2012
Language:
english
File:
PDF, 1.34 MB
english, 2012
11

Web service-based standards for biometrics interoperability

Year:
2013
Language:
english
File:
PDF, 504 KB
english, 2013
12

The true cost of being hacked

Year:
2014
Language:
english
File:
PDF, 1.87 MB
english, 2014
13

Market report: healthcare biometrics

Year:
2015
Language:
english
File:
PDF, 463 KB
english, 2015
15

Taking agile development beyond software – what are the security risks?

Year:
2015
Language:
english
File:
PDF, 1.06 MB
english, 2015
16

Comment

Year:
2017
Language:
english
File:
PDF, 171 KB
english, 2017
17

Plugging IT/OT vulnerabilities – part 2

Year:
2018
Language:
english
File:
PDF, 2.21 MB
english, 2018
20

When worlds collide: the security of converged networks

Year:
2011
Language:
english
File:
PDF, 317 KB
english, 2011
24

Comment

Year:
2010
Language:
english
File:
PDF, 223 KB
english, 2010
25

Comment

Year:
2011
Language:
english
File:
PDF, 104 KB
english, 2011
26

Comment

Year:
2010
Language:
english
File:
PDF, 78 KB
english, 2010
27

Comment

Year:
2011
Language:
english
File:
PDF, 100 KB
english, 2011
28

Comment

Year:
2010
Language:
english
File:
PDF, 97 KB
english, 2010
29

Comment

Year:
2011
Language:
english
File:
PDF, 102 KB
english, 2011
30

Comment

Year:
2011
Language:
english
File:
PDF, 100 KB
english, 2011
31

Comment

Year:
2011
Language:
english
File:
PDF, 98 KB
english, 2011
32

Comment

Year:
2011
Language:
english
File:
PDF, 106 KB
english, 2011
33

Comment

Year:
2011
Language:
english
File:
PDF, 159 KB
english, 2011
34

Comment

Year:
2011
Language:
english
File:
PDF, 101 KB
english, 2011
35

Comment

Year:
2011
Language:
english
File:
PDF, 106 KB
english, 2011
36

Comment

Year:
2012
Language:
english
File:
PDF, 101 KB
english, 2012
37

Comment

Year:
2011
Language:
english
File:
PDF, 100 KB
english, 2011
38

Comment

Year:
2012
Language:
english
File:
PDF, 120 KB
english, 2012
39

Comment

Year:
2012
Language:
english
File:
PDF, 109 KB
english, 2012
40

Comment

Year:
2012
Language:
english
File:
PDF, 106 KB
english, 2012
41

The mobile ‘kill pill’ – poison or panacea?

Year:
2011
Language:
english
File:
PDF, 303 KB
english, 2011
42

Data loss prevention – not yet a cure

Year:
2011
Language:
english
File:
PDF, 556 KB
english, 2011
44

Comment

Year:
2012
Language:
english
File:
PDF, 201 KB
english, 2012
45

Comment

Year:
2012
Language:
english
File:
PDF, 100 KB
english, 2012
46

Locking down the VPN

Year:
2012
Language:
english
File:
PDF, 1.10 MB
english, 2012
47

Reporting data breaches

Year:
2012
Language:
english
File:
PDF, 1005 KB
english, 2012
48

Seek and destroy

Year:
2012
Language:
english
File:
PDF, 801 KB
english, 2012
49

The perimeter is dead – what next for the appliance?

Year:
2012
Language:
english
File:
PDF, 844 KB
english, 2012