1. GFI White PaperWhy you need an email exploitdetection engine The danger of email exploitsThis white paper explains what email exploits are, providesexamples of common…
1. Ransomware: Hijacking Your Data By Richard Wang and Anand Ajjan, SophosLabs “Federal Bureau of Investigation. Attention! Your computer has been locked.” For the last…
1. Mobile Device Security The next challenge Jan Guldentops ([email_address]) BA N.V. (http://www.ba.be) 2. About BA More information 3. I nformationI ntegration i 4. Our…
Slide 1Spyware. Is it a real problem ? Slide 2 Gareth Smith RAL PPD Vendors are concerned about the cost of dealing with spyware-related complaints. But they also fear that…
1. Security Glossary http://www.viruslist.com/en/glossary3 3G 3G (short for 3rd Generation) is the general term for technologies and standards designed to combine high speed…
Introduction OPSWAT releases quarterly market share reports for several sectors of the security industry. This quarter’s report includes both worldwide and North American…
1. Ransomware: Hijacking Your Data By Richard Wang and Anand Ajjan, SophosLabs “Federal Bureau of Investigation. Attention! Your computer has been locked.” For the last…
Solving Your Organizationâs #1 Business Problem Tech ThrowDown: Invincea FreeSpace vs EMET 5.0 Detection | Prevention | Intelligence October 31, 2014 Darrin Mourer, Cissp…
Solving Your Organizationâs #1 Business Problem Presented By: Darrin Mourer Solution Architect Invincea Meet the Presenter Darrin is a Solution Architect with Invincea specializing…