Skip to main content

White Papers

What is Cyber-bullying?

The past two decades have witnessed a virtual explosion in new technology that has been eagerly embraced by adolescents worldwide. New technology has many social and educational benefits, but caregivers and educators have expressed concern about the dangers young people can be exposed to through these technologies.

Read More

No Company Is Immune to Data Loss

In today's business environment, media headlines are increasingly featuring data breaches of large magnitudes that put people's personal information at risk, and no country or industry is immune (Figure 1. Incidents by Business Type - All Time (Source: DATAlossdb.org/statistics)). With the changing landscape of business...

Read More

One of the most difficult issues security managers have is justifying how they spend their limited budgets. For the most part, information security budgets are determined by percentages of the overall IT budget. This implies that security is basically a "tax" on IT, as opposed to providing value back to the organization.

Read More

Mobile devices are now the centerpiece to consumer lifestyles. From e-mail communication, social networking, banking, games, music and video, mobile devices have forced a radical shift in the way in which organizations service their customers. In a June 2010 report on Internet trends, Morgan Stanley predicted that by 2012 the number...

Read More

Modern hardware trends and economics [1] combined with cloud/virtualization technology [2] are radically reshaping today's data management landscape, ushering in a new era where many machine, many core, memory-based computing topologies can be dynamically assembled from existing IT resources and pay-as-you-go clouds.

Read More

Cloud computing is an important transition and a paradigm shift in IT services delivery - one Cloud Computing that promises large gains in efficiency and flexibility at a time when demands on data centers Key Considerations are growing exponentially. The tools, building blocks, and best practices for cloud computing...

Read More

For years the software industry has promoted reduced privileges for user accounts as a key security best practice to prevent misuse and successful exploitation of end-point systems. There are two main rationales/assumptions that back up this strategy: (A) malware requires administrative access to successfully....

Read More

For years the software industry has promoted reduced privileges for user accounts as a key security best practice to prevent misuse and successful exploitation of end-point systems. There are two main rationales/assumptions that back up this strategy: (A) malware requires administrative access to successfully....

Read More

Is your Web site attacking your users?

The proliferation of malware designed to infiltrate computer systems without the owners' informed consent has become one of the most challenging security issues facing users today. Hackers are engineering ever more sophisticated viruses, worms and Trojan horses that can increasingly outsmart traditional defense mechanisms.

Read More

In an E-commerce environment, the risks associated with availability, performance, scalability and security should take priority in building a risk mitigation strategy. These factors are critical to consider even in a hosted E-commerce environment and should be addressed whether the organization is small, medium or large,...

Read More