Russian Underground 101
This research paper intends to provide a brief summary of the cybercriminal underground and shed light on the basic types of hacker activity in Russia. It discusses fundamental concepts that Russian hackers follow and the information they share with their peers. It also examines prices charged for various types of services, along with how prevalent the given services are in advertisements. The primary features of each type of activity and examples of associated service offerings are discussed as well. Read this paper.
Conventional security detects threats too late (if at all), and resolves them too slowly. It gives security teams a fragmented, incomplete view into what’s going on in their network. It’s passive and blind to broader threat trends. And it reacts too slowly to new threats and changing conditions. Discover the 10 components to re-imagining security with adaptive defence. Download whitepaper »
Organisations are readily launching BYOD programs to boost employee productivity and reduce costs. But this all comes at a risk and you maintain your vigilance in sustaining compliance with data security and privacy regulations. This whitepaper looks at several best practices are key for maintaining regulatory compliance with any BYOD program. Download whitepaper »
This case study looks at how Maum Golf in South Korea partners with Dell OEM Solutions to reach its goals of expansion into new markets and grow their market share from 20 percent, to more than 30 percent by the end of 2015. Download whitepaper »
Cloud, big data and analytics, mobile, social, and IT security have impacted networking – bringing it almost to breaking point. This whitepaper looks at the future of networking to accommodate these evolving trends.
Email archiving is a little bit like driving your reliable car. You expect it to operate smoothly, day after day, and do not necessarily plan for any crisis events such as a sudden engine failure. That is about the same perception many enterprises have about email. They don't worry about backup, about archiving, about eDiscovery, until, as one IT administrator said, something goes wrong. As the CIO whose diverse responsibilities includes budget control, cost avoidance, risk mitigation, data management and supporting the operational excellence of the enterprise as a whole, email archiving may not always be top of mind. Until something goes wrong. Read this whitepaper to learn how next-gen email archive delivers true business value.
- Researchers improve de-anonymization attacks for websites hiding on Tor
- Business as usual for enterprise migrations to Windows 10
- Facebook aims to launch unmanned drone by year-end
- Android for Work gains mobile-carrier support
- Windows 10's launch was a bit bumpy, but people seem to like it
- Google rejects French request to expand right to be forgotten
- Focus turns to mobile Windows 10 and Lumia flagships
- Critical BIND denial-of-service flaw could disrupt large portions of the Internet
- Opponents focus on defeating CISA cyberthreat info sharing bill
- Is the smartphone market saturated?
- Using Watson, IBM and CVS aim to predict when your health is about to decline
- Endpoint security firm SentinelOne challenges traditional anti-virus software
- DataTorrent tackles complexity of Hadoop data ingestion
- Java 9 plays catch-up, adds REPL for faster feedback
- Open-source startup hopes to change the way businesses visualize data