Sistema

Wed
30
Dec

Essential Trends and Dynamics of the Endpoint Security Industry

Contributed by Lenny Zeltser and an Anonymous author

This paper examines trends and dynamics of the endpoint security industry, and shows how business strategies of market leaders such as Symantec exemplify these factors. When exploring current developments in the information security marketplace, we stipulate that this sector is beginning to converge with the general IT software industry in response to factors such as the evolution of the industry structure, competitive dynamics, regulatory compliance efforts, and the maturing state of security products.

This document is in PDF format. To view it click here.

Wed
30
Dec

End Point Security - Securing the final three feet

Contributed by Charles F. Moore

Information security has tended to be reactive over the years. With each new virus, or worm the system administrators struggled to get updates out to the end points. Even if the system administrators were successful, there was always the potential that one device was missed. One device is all it would take to cripple the network. This paper will examine several ways that system administrators can begin contemplating and planning on implementing end point security in their organization. It is time for security to get to the last three feet and protect the organizations assets.

This document is in PDF format. To view it click here.

Tue
29
Dec

Is Your Device Being Held Hostage?

Contributed by A. Michele Parrish

Ransomware could be a potential problem for users of electronic devices. This paper will examine ransomware. I will discuss what it is and how your device can be infected. I will explore the reasons why it is growing and the new devices it is infecting. I will also explain ways in which a normal user can protect themselves against ransomware.

This document is in PDF format. To view it click here.

Thu
10
Dec

Mobile Device Security

Contributed by Boyd Aaron Sigmon

Daily usage of mobile devices, such as smartphones and tablets, has surpassed desktop and laptop computers in this day and age. Because of the growing popularity of these pocket-sized computing devices, and the fact that they are almost always full of a person’s personal information, attackers now have a number of incentives to try to compromise your mobile device. The purpose of this paper is to discuss some of the most common types of mobile device security threats today, and to provide you with the knowledge of how to protect your mobile device against them.

This document is in PDF format. To view it click here.

Fri
27
Nov

Virtual Machines and Security

Contributed by Paola Stone Martinez

The rapid growth of technologies, nowadays, demands a high availability of equipment. One of these areas is the Information Technology (IT) field where the continuous development of new software is not backed up by hardware improvements. In the IT field it is very common to find that companies have equipment with great physical capabilities, but it is not being used at its maximum. Individual severs machines often run at 5 – 10% CPU utilization. By using virtualization, various virtual servers can be consolidated within in physical server while still allowing independent configuration and failure isolation” [1]. These are some of the reasons of why virtualization has become very popular, and more companies and individuals are opting for its use

Pages

Subscribe to RSS - Sistema