Category: Data Security
Published: January 2009
The report covers key highlights include the growth of malware on legitimate website, SQL injection attacks, the use of distributed automated hacking tools, malware hosting by geogrpahic area and the risk that your users can pose when they resist your web filtering controls by changing their access port, using anonymising sites like vtunnel which can circumvent content scanning at the perimeter.
Rating: + 2
Wireless Technologies | September 2012 | White Paper
Managed Security Services | August 2012 | Article
Unified Threat Management | August 2012 | White Paper
Internet Security | August 2012 | White Paper
Data Security | July 2012 | White Paper
© Incisive Media Investments Limited 2013, Published by Incisive Financial Publishing Limited, Haymarket House, 28-29 Haymarket, London SW1Y 4RX, are companies registered in England and Wales with company registration numbers 04252091 & 04252093.