CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

hack

Results 276 - 300 of 342Sort Results By: Published Date | Title | Company Name
Published By: Symantec     Published Date: Dec 04, 2014
SSL Certificates have been in use for almost 15 years, and they continue to serve a vital role in protecting data as it travels across the Internet and other networks. From online financial transactions to e-commerce to product development, SSL Certificates make it possible for users around the world to communicate sensitive information with the confidence that it is safe from malicious hackers. The Internet has evolved in innumerable ways over the past decade and a half; so why do SSL Certificates continue to instill trust? Simply put, SSL Certificates are very effective in protecting data in transit. Yet, customers transacting on websites and systems that are protected by SSL security still face serious threats . One key reason for this danger: poor SSL Certificate management. Enterprises with hundreds of SSL Certificates from several different providers could lose track of certificates in their environment. This white paper will present the pitfalls associated with poor SSL Certificate management, why they are potentially dangerous to the enterprise, and how enterprises can keep track of SSL Certificates effectively.
Tags : 
ssl, ssl certificates, business continuity, breach protection, protection, e-commerce, malicious hackers, security
    
Symantec
Published By: LiveHive     Published Date: Feb 16, 2016
Best selling author and sales expert Jill Konrath breaks down productivity hacks to getting more done in less time. Jill will look at different methods to help you eliminate the distractions that donít contribute to your sales goals, tame procrastination and master the art of motivation, and employ the right tools to automate work and focus your efforts on meaningful activity.
Tags : 
sales process, livehive, productivity hacks, ebook, best practices, sales
    
LiveHive
Published By: AirDefense     Published Date: Apr 24, 2007
This document outlines how hackers are exploiting vulnerabilities in 802.11 wireless LANs and describes the widely available hacking tools. As a collection of already published risks to wireless LANs, this white paper is written to inform IT security managers of what they are up against.
Tags : 
hackers, hacker, hacker detection, intrusion prevention, wireless security, wlan, wlans, 802.11, wireless lan, monitoring, airdefense
    
AirDefense
Published By: Hewlett Packard Enterprise     Published Date: Mar 29, 2017
Join this dynamic LinkedIn group to be part of the cyber-security education conversation to gain an understanding for the best practices to improve security. Learn why HP says 64% of IT managers believe their printers are infected with malware, but only 45% of those IT professionals consider printers to be a medium or high risk vulnerability. The first responsibility of IT professionals is to make sure their companyís information is secure and today any device can become an access point threat. Printers and MFPs can be the Achillesí Heel of any cyber-security plan and are a goldmine for hackers looking to steal pertinent information. Join the conversation and learn whatís necessary to protect your company.
Tags : 
hewlett packard, printer security, information technology
    
Hewlett Packard Enterprise
Published By: AirTight Networks     Published Date: Nov 30, 1999
Making corporate data accessible through Wi-Fi networks means intruders and other unwanted visitors can easily access such networks if proper precautions and tools aren't used to protect them. This paper will discuss best practices in all five areas to secure the enterprise network, whether wired or wireless.
Tags : 
wireless, best practices, enterprise security, wi-fi, wireless security, network security, intrusion prevention, lan, local area network, local area networking, hacker detection, airtight, airtight networks, vulnerability management
    
AirTight Networks
Published By: Internet Security Systems     Published Date: Aug 21, 2009
Spyware is but the latest in a long list of Internet threats facing individuals and organizations alike. While it may sound relatively innocuous, spyware is the culmination of years of hacking development by cyber criminals. Spyware does more than just spy; it records and reports back specific information about the computer it infects.
Tags : 
spyware, information management, information theft, identity theft, data protection, anti spyware, anti-spyware, cybercrime, cyber crime, hacker, web security, internet security, internet security systems, anti virus, hacker detection
    
Internet Security Systems
Published By: netVigilance     Published Date: Aug 21, 2009
This white paper explains the evolving needs for vulnerability assessment, the special requirements inherent within large enterprises, and how SecureScout SP from netVigilance meets those needs.
Tags : 
vulnerability management, ips, intrusion prevention, security management, hackers, hacker, hacker detection, network security, net vigilance, netvigilance, security, application security, intrusion detection
    
netVigilance
Published By: NitroSecurity     Published Date: Aug 21, 2009
NitroSecurity's Active Network Response is a new security model that delivers network protection closer to the users at the network edge - stopping attacks before they can propagate throughout the network. 
Tags : 
network security, intrusion prevention, hackers, hacker detection, ips, anr, nitro security, nitrosecurity, security management
    
NitroSecurity
Published By: PassGo     Published Date: Oct 23, 2007
Looking at IT security history, the bad guys were always far more sophisticated than the people who tried to stop them. Even if companies or the government could conceive of IT security it was almost impossible to achieve it because of the lack of knowledgeable security professionals out there and the lack of security protection tools in the marketplace.
Tags : 
risk assessment, hacker, hackers, hacker detection, cyber crime, cybercrime, cybercrimes, intrusion, intrusion prevention, intrusion detection, network security, azoogle, azoogle ads
    
PassGo
Published By: Secure Computing     Published Date: Aug 21, 2009
This paper outlines the types of threats that leverage the Internet as a means of delivery and the risks that they pose to your organization. Learn the key drivers of a corporate security policy and how you can protect against HTTP-based threats using Web filtering as part of a multi-layered content security strategy.
Tags : 
security, anti spyware, malware prevention, malware, access control, hacker detection, internet security, security management, web service security, secure computing, securecomputing, network security
    
Secure Computing
Published By: Secure Computing     Published Date: Feb 22, 2007
This paper outlines these new threats and discusses the limited effectiveness of reactive legacy Web security solutions against those threats.  The paper then outlines the new reputation based, proactive security paradigm that is necessary for securing Web 2.0 applications.
Tags : 
web 2.0, web 20, web security, application security, web app security, internet security, network security, hacker detection, intrusion prevention, secure computing, securecomputing, security, security management, web service security, web services
    
Secure Computing
Published By: Spectra Logic     Published Date: Aug 21, 2009
Most companies continue to turn their backs on backup encryption because they think it will lead to new costs, performance problems, and recovery headaches. Read why ESG believes things are about to change to radically upset the backup encryption status quo and why Spectra Logic's recent entry into backup encryption is worth noting.
Tags : 
encryption, data encryption, backup, esg, backup encryption, data security, hackers, tape backup, tape-based backup, spectra logic, spectralogic
    
Spectra Logic
Published By: Third Brigade     Published Date: Aug 21, 2009
Businesses today are under intense pressure to open up their networks, comply with increasingly rigorous regulatory requirements, AND ensure their IT assets are protected from attacks. This white paper explores these security challenges and explains how host-based Intrusion Prevention Systems  play a critical role in an organization's overall security strategy.
Tags : 
intrusion prevention, security, network security, compliance, security compliance, attacks, hacker detection, ips, intrusion prevention system, security strategy, security management, third brigade, firewalls, internet security, intrusion detection
    
Third Brigade
Published By: Third Brigade     Published Date: Aug 21, 2009
Healthcare organizations are being targeted by financially motivated attackers that steal and sell valuable data, including identities and computing resources. This white paper defines the new threat, and outlines three important steps that providers can take to protect their critical systems.
Tags : 
hipaa, hipaa compliance, network security, network security appliance, security management, intrusion prevention, intrusion detection, hacker detection, ips, host-based ips, third brigade, security, access control, application security, authentication, firewalls, internet security
    
Third Brigade
Published By: Third Brigade     Published Date: Aug 21, 2009
Organizations that need to protect business critical applications, and sensitive data and hosts recognize that traditional network defenses can be readily bypassed by attackers. This white paper defines four key qualities of an effective host-based IPS.
Tags : 
intrusion prevention, network security, data protection, hacker detection, intrusion detection, ips, intrusion prevention systems, host-based ips, security strategy, third brigade, security, security management
    
Third Brigade
Published By: Third Brigade     Published Date: Nov 27, 2006
This white paper identifies critical vulnerabilities that most organizations overlook when they secure their web applications. It also introduces host intrusion defense with deep packet inspection as a new, effective  approach for shielding these vulnerabilities.
Tags : 
web application security, application security, web security, web service security, security management, internet security, ips, intrusion prevention, intrusion detection, hacker detection, third brigade, security, it management, platforms, web services
    
Third Brigade
Published By: Third Brigade     Published Date: May 25, 2007
This white paper identifies twelve critical questions that organizations need to consider when selecting a Host Intrusion Prevention System product. These questions relate to protection, manageability, integration and speed.
Tags : 
host ips, ips, hips, intrusion prevention, vendor selection, software selection, security, hacker prevention, hackers, anti virus, anti spyware, network security, cybercrime, third brigade, access control, firewalls, internet security, intrusion detection
    
Third Brigade
Published By: TopLayer     Published Date: Aug 21, 2009
Enterprises without a sound intrusion prevention strategy across the three threat dimensions - undesired access, malicious content, and rate-based attacks - open the door to unacceptable risks and costs, especially from hybrid attacks.
Tags : 
intrusion prevention, network security, ips, access control, hacker, top layer, toplayer, 3-d multi-layered, multi-tiered, multi tiered, hacker detection, internet security, intrusion detection
    
TopLayer
Published By: TopLayer     Published Date: Aug 21, 2009
This white paper written by Reymann Group, compliance consultant firm, showcases thought leadership on how intrusion prevention solutions can enable proactive security responses necessary to protect today's corporate enterprise and its customers from real time threats posed by widespread cyber terrorists, hackers, and rogue insiders.
Tags : 
sarbanes, intrusion prevention, ips, sox, sarbanes-oxley, sarbox, network security, cybercrime, hacker, intrustion detection, toplayer, compliance, top layer, sarbanes oxley compliance
    
TopLayer
Published By: Symantec     Published Date: Nov 02, 2006
The IT threat landscape has changed from individual hackers disrupting network operations to organized crime stealing confidential information. Antivirus technology must be joined by a coordinated, multilayered defense that includes proactive vulnerability-based intrusion prevention, file-based intrusion prevention, and inbound and outbound traffic control.
Tags : 
security, hacker detection, internet security, crimeware, spyware, intrusion prevention, anti virus, hacker prevention, access control, high availability, symantec, network security, anti spyware, application security, intrusion detection, security management
    
Symantec
Published By: Quocirca     Published Date: Apr 09, 2008
Today, many organizations are increasingly reliant on software application development to deliver them competitive edge. Simultaneously, they are progressively opening up their computer networks to business partners, customers and suppliers and making use of next-generation programming languages and computing techniques to provide a richer experience for these users. However, hackers are refocusing their attention on the vulnerabilities and flaws contained in those applications.
Tags : 
quocirca, application security, security
    
Quocirca
Published By: Cenzic     Published Date: Nov 30, 2006
With web applications constantly evolving, finding vulnerabilities is a challenging, costly and time-consuming undertaking.  Find out how Cenzic's powerful security solutions help information security teams quickly identify problems, regularly assess web application security strength and ensure regulatory compliance.
Tags : 
application security, vulnerabilities, vulnerability management, security complinace, compliance, regulatory compliance, it spending, hacker detection, cenzic, security, auditing, authentication, encryption, firewalls, identity management, internet security, intrusion detection, intrusion prevention, policy based management, security management
    
Cenzic
Published By: Cenzic     Published Date: Nov 21, 2006
Enterprises are responding to new threat on communication protocols by hardening Web applications, and they are increasingly turning to Web application security assessment tools to improve the security of their applications. This report examines why high accuracy is critical to the effectiveness of the tools, and it discusses how Cenzic Hailstorm addresses this problem.
Tags : 
application security, web application security, hacker detection, cenzic, cenzic hailstorm, security, ip networks, network security, internet security, web service security, vulnerability management
    
Cenzic
Published By: Envisional     Published Date: Dec 21, 2006
The Internet's reach and anonymity have played a big part in the 100-fold growth of counterfeiting since the 1980s. The web provides a shop window on the world, yet it's impossible to police.
Tags : 
counterfeiting, hacker, counterfeit, brand infringement, branding, copy, envisional, hacker detection, internet security
    
Envisional
Published By: Cyberoam     Published Date: Apr 19, 2007
Protecting students from the millions of sites that house pornography, adult chat rooms, violence & hacking can provide not just a safe surfing atmosphere to minors in schools and libraries, but also qualify the institutions for federal E-rate funding through compliance with CIPA - the Children's Internet Protection Act.
Tags : 
cipa, cipa compliance, cyberoam, cyberroam, chat room, hacking, childrends internet protection act, monitoring, compliance, hacker detection, internet security, security management, secure instant messaging, employee performance, desktop management
    
Cyberoam
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search