ESSENTIAL GUIDE:
This article in our Royal Holloway Security Series explores the uses and capabilities of rogue USB hardware implants for use in cyber espionage activities.
ESSENTIAL GUIDE:
This article in our Royal Holloway Security Series analyses the effectiveness and behavior of 32-bit and 64-bit antivirus software in Windows 7.
EZINE:
An issue looking at what products are in demand now in the storage world and what technologies are coming that need to be embraced by the channel.
ESSENTIAL GUIDE:
The National Museum of Computing has trawled the Computer Weekly archives for another selection of articles highlighting significant articles published in the month of May over the past five decades.
EGUIDE:
Discover the importance of application security testing and Web application firewalls (WAFs) in the delivery of modern web-based application deployments.
WHITE PAPER:
A major security incident happening isn't a matter of "if", it's simply a matter of "when" for the modern business. This expert e-guide will lead you through the pillars of a solid incident response plan, how to automate your policy with incident response tools, and more.
EGUIDE:
Organizations turn to the public cloud for its massive, on-demand compute and storage capabilities. But none of those capabilities matter if there isn't proper networking and security policies to ensure applications run safely and smoothly. In this expert guide, learn methods to properly secure your network as you migrate to the cloud.
EGUIDE:
Gain insight into what an application security program might look like as it develops and what experts have to say about what it could mean for the future of application development.