Company: Intel UK
Category: Data Security
Published: November 2012
Unlike yesteryear's amateur virus-producing hackers, who created widespread threats, today's cyber-criminals instigate much more specific attacks. Criminals are using stealth techniques to deliver their crimeware, allowing it to find targets and dig in below the operating system (OS). This paper surveys embedded technologies and how they can help IT's toughest security challenges.
Data Security | May 2013 | Case Study
Cloud computing | May 2013 | Case Study
Data Centre & Storage Solutions | May 2013 | Case Study
Data Security | May 2013 | White Paper
Enterprise Data Privacy | December 2012 | White Paper
© Incisive Media Investments Limited 2013, Published by Incisive Financial Publishing Limited, Haymarket House, 28-29 Haymarket, London SW1Y 4RX, are companies registered in England and Wales with company registration numbers 04252091 & 04252093.