Articles News Reviews Releases Downloads Contact Us White Papers

DDoS Attacks Gear Up With Ten Times Greater Power

Many businesses may believe they have prepared their Internet defences adequately against Distributed Denial of Service (DDoS), but the attacks they are fending are about to become increasingly fierce. Prolexic Technologies has already seen the devastating capabilities of a server-based zombie assault which floods its targets with more than 15 million packets a second, and it warns that we are likely to see bigger and more complicated DDoS attacks in 2006.

Easing the Pain of Systems Disruption

Downtime is becoming more and more painful for organizations. Consider these statistics: According to Infonetics Research, large companies lose up to 16% of their annual revenue due to unplanned network downtime. Additionally, a recent survey commissioned by Symantec found that 30 percent of respondents indicated their company incurs at least $10,000 in productivity and revenue losses after suffering a server failure.

Improve Privileged User Accounts Management

One of the biggest issues facing organisations is the elimination of bad practices related to the use and abuse of privileged accounts. Organisations frequently suffer from unrealistic policies that are being bypassed, usually because of a lack of resources, or having no policies with the result that there is no control.

How to Steal Money with a Virus

When talking about the Internet and associated technology, it is quite common to talk about cyberspace. A parallel universe, virtual and intangible, in which everything that exists in the real world can exist through a cable. Modern technologies have enabled the creation of this digital world in which any experience is possible.

Business Process Management Agility

The benefits of automating business processes are well recognized. Business Process Management (BPM) software is helping companies accelerate decision-making, cut lag time, reduce human error, increase consistency and conform to compliance guidelines.

Review: Acunetix Web Vulnerability Scanner

More companies than ever are using web applications for their business, yet only a small percentage of websites are tested for vulnerabilities. Through web application vulnerabilities, hackers can gain access to sensitive data such as customer’s details and corporate data: Gartner study reveals that 75% of cyber attacks are launched on shopping carts, forms, login pages etc.; 8 out of 10 websites have at least one serious vulnerability.

How Security Threats Affect PC Performance

Security threats are everywhere - spyware and adware installed inadvertently over the internet, viruses transmitted through email, keyloggers penetrating your firewall, malicious code broadcast over peer-to-peer networks. Here are five threats that will reduce system performance, destabilise your system, generate unusual behaviour, modify your Windows Registry and hog your Internet bandwidth.

Security Best Practices Without Question?

Are you feeling insecure lately? No, not about yourself – but about your organization’s competitive position in the marketplace? What about its ability to meet client and business partner obligations? Or, it’s ability to stay out of the court system and on the good side of your industry’s regulators?

Build Effective Security Awareness Program

You’ve developed a world class security program. Your technology-based defenses are cutting edge. Your security team is well trained and ready to handle anything that comes its way. So you’re done, right? Not quite. One of the most important pieces of an effective information asset defense is missing – employee awareness.

Magnetic Data Recovery – The Hidden Threat

The majority of today’s businesses rely in some way upon computer systems to handle the tasks of everyday commerce. These businesses are increasingly using computers to work with their internal and external documents, depending more and more on digital storage every day. Most attention has been focused on well-known problems such as viruses, exploits, etc.

Next




Site Meter