• October 30, 2006 30 Oct'06

    Countermeasures for malicious email code

    Today's malware continues to raise the security stakes. Enterprises are now facing numerous evolving threats like targeted and blended attacks, zero-day exploits, botnets and phishing schemes. The attacks aren't the only things evolving; so are ...  Continue Reading

  • October 30, 2006 30 Oct'06

    Esure has Wily way to handle screen scraping

    Online insurance company esure has employed a Wily web performance management tool from Computer Associates to ensure its website availability remained close to 100% throughout its summer sale, despite peaks in CPU demand created by an online ...  Continue Reading

  • October 30, 2006 30 Oct'06

    Essential practices for securing mobile devices

    In this lesson, Lisa Phifer examines inherent weaknesses in mobile messaging devices, and discusses how to lock down mobile platforms to protect against emerging threats and risky end-user behaviors and how to ensure Bluetooth-enabled handsets ...  Continue Reading

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

SearchDataManagement

Close