EZINE:
In this week's Computer Weekly, 12 years after we broke the story, victims of the Post Office IT scandal finally have their criminal convictions overturned. We take a virtual tour of a Microsoft datacentre and meet a server called 'Mega-Godzilla Beast'. And we find out how technology is transforming Nationwide Building Society. Read the issue now.
INFOGRAPHIC:
It's easy to see why Business Email Compromise attacks work. Preventing them, however, is not so simple -- especially when attackers rely on cognitive biases. Distinguishing between genuine and fraudulent email communications is challenging enough -- and it's also only part of reducing BEC risk. Here are 8 BEC prevention tips for security leaders.
EGUIDE:
Download this e-guide for an exclusive Q&A with Raluca Ada Popa. Popa is equipped with four degrees from Massachusetts Institute of Technology, two research fellowships and a bevy of awards and merits. In this Q&A Popa discusses the future of data security and the challenges of ensuring adequate defense.
WHITE PAPER:
Access this white paper for an e-mail archiving solution that offers powerful search capabilities and improved archiving functions to reduce time spent trying to find specific historical messages.
EGUIDE:
In this expert e-guide, discover the best and worst practices for email archiving, and review an essential checklist for ensuring that Exchange archives remain compliant.
WHITE PAPER:
Find out how HP Messaging Services can increase the reliability and performance of email systems, and help better manage your infrastructure with consistent, efficient and cost-competitive services.
WHITE PAPER:
This guide from VeriSign Authentication Services will help take the guesswork out of implementing SSL for Exchange 2010, making it easier than ever to get the SSL certificate you need for a successful and secure Exchange implementation, and to take advantage of powerful capabilities such as Subject Alternative Names (SANs).
WHITE PAPER:
Review today's best (and worst) practices for email archiving inside this Exchange e-guide. Gain expert tips and tricks for managing and monitoring your Exchange servers along with six commonly overlooked security vulnerabilities to look out for.
WHITE PAPER:
With cyber-attacks growing in regularity and complexity, many businesses have to go the extra mile to protect their sensitive data. This case study takes a look at one company's success when implementing a Web-based malware protection system.