White Papers

View All RSS Feed

Last Updated on 23 July 2014, Total: 1057 White Papers

26 Anti Spam 19 July 2013
12 Anti Virus 19 July 2013
45 Auditing 23 July 2014
60 Auth. & Access Control 19 July 2013
3 Content Management 19 July 2013
103 Cryptography 19 July 2013
12 Disaster Recovery 24 Jan. 2013
84 Firewalls & VPN's 10 Sept. 2013
6 Forensics 24 Jan. 2013
41 Harmless hacking book 24 Jan. 2013
1 Honeypots 23 Jan. 2013
14 Information Warfare 19 July 2013
26 Intrusion Detection 24 Jan. 2013
8 Law 21 June 2013
3 Managed Security Solutions 19 July 2013
109 Misc 19 July 2013
24 Mobile Code 24 Jan. 2013
32 NCSC&DoD Rainbow series 24 Jan. 2013
34 NetWare 24 Jan. 2013
33 Network Security 19 July 2013
4 Patch Management 24 Jan. 2013
3 Phishing 24 Jan. 2013
49 Policy & Standards 27 Aug. 2013
25 Privacy 24 Jan. 2013
21 Software Engineering 19 July 2013
2 Trojans 23 Jan. 2013
2 Underground 24 Jan. 2013
167 Unix Security 24 Jan. 2013
48 Web Security 19 July 2013
54 Windows Security 19 July 2013
6 Wireless Security 24 Jan. 2013
  1. How to Audit the 5 Most Important Active Directory Changes

    Active Directory is the central identity store and authentication provider for most networks today making it hugely critical to security... Read More

  2. Why You Need a Next-Generation Firewall

    There are three primary reasons why next-generation firewalls make sense as organizations build and fortify their environments for the future and go beyond looking at IP addresses, ports and protocols for classifying and controlling network traffic... Read More

  3. Data Security Standard and Payment Application Data Security Standard

    Version 3.0 Change Highlights... Read More

  4. The Pharming Guide

    Exploiting well known flaws in DNS services and the way in which host names are resolved to IP addresses, Phishers have upped the ante in the cyber war for control of a customer’s online identity for financial gain. A grouping of attack vectors now referred to as “Pharming”, affects the fundamental way in which a customer’s computer locates and connects... Read More

  5. Tricks of the Spammer's Trade

    Spammer's try to get their messages through spam filters by using trickery. Let’s see how these tricks work, and how up to date filters spot the trickery and use it to their advantage. This article takes a deeper look into what tricks spammer's use to get past bayesian and heuristic filters... Read More

  6. Remote user security: Your IT's Achilles heel?

    Remote working has radically altered employment practices within the new economy, but the benefits (such as employee flexibility and increased productivity) need to be balanced against the problems of managing teleworkers. In particular, companies need to make sure that remote PCs remain properly protected against computer viruses and other security exposures... Read More

  7. Email Compliance

    As if the business needs surrounding email aren’t enough for organizations to manage, there has been a recent surge of government regulations that affect this form of communication. These laws, which affect large and small companies alike in practically every industry, include protecting confidential customer information, corporate governance, law enforcement investigations, and the overall need to ensure that email is... Read More

  8. Attacking the DNS Protocol

    DNS is the most widely used protocol on the Internet yet many security professionals do not have a full understanding of the many weaknesses which surround it which are needed for Penetration Testing and day to day security. In this paper we highlight basic and advanced DNS attacks... Read More

  9. Reducing Corporate Liability With Filtering and Policy Tools

    The overwhelming majority of corporate email addresses today receive unsolicited commercial email, or spam. For a growing number of recipients, this includes spam with adult content or pornography known as unsolicited pornographic email (UPE). UPE poses serious legal risks to corporations, wastes valuable corporate computing resources, and reduces employee productivity... Read More

  10. Fighting Spam

    Spam is costing $8.9 billion to U.S. corporations, $2.5 billion for European businesses and another $500 million for U.S. and European service providers. Figuring it takes 4.4 seconds on average to deal with a message, the messages add up to $4 billion in lost productivity for U.S. businesses each year. This white paper will show you why you receive spam... Read More

Featured Links