Amichai Shulman answers 10 questions about being Imperva's CTO and a day in the job.
With IT heads currently sitting on the fence and debating the best methods to deal with the BYOD trend and related security concerns, what is clear is that mobility has all the more extended the CIO role beyond that of an IT enabler.
Organizations in 14 countries targeted.
Users enjoying increased connectivity unlikely to take protection measures.
Global Trading Offshore Pte Ltd decided, after considering various options, on a strategy and solution that would enable them to transition smoothly to their new location.
The death of Osama Bin Laden has set Facebook and Twitter records, not only in terms of site traffic and social media participation, but also in the spread of malware and links to scareware portals. The CPF Board, Singapore Power, and Aviva Asia are among Singapore organizations that have entrusted the protection of their networks to M86 Security.
When it comes to surfing the Web, Asian men consider speed a priority, while Asian women tend to put safety first.
The seemingly endless disasters that followed the 8.9 magnitude earthquake in Japan is now the target of spammers. After the earthquake and tsunami hit, hackers have also upped their activities in an attempt to cause damage online as well.
Radware's Emergency Response Team reverse-engineered the Circle-CC DDoS attack vector targeting key government and commercial websites in South Korea that amplify the impact by preventing web servers from using their caching mechanisms.
China-listed digital cable TV operator trials Irdeto’s Cloaked CA to transition two million subscribers from analog to digital TV.
Testing the Cloud – Definitions, Requirements, and Solutions
The widespread availability of high-speed broadband networks has seen applications and web sites move into the Cloud. This use of a cloud-based infrastructure means there is no local infrastructure to purchase, manage, secure, or upgrade. The virtualized data center, whether within the enterprise or located at a cloud service provider, must be properly provisioned in order to provide the necessary functions and performanceof cloud-based applications.
Integrating the physical and the virtual
It’s not just a question of dealing with a proliferation of virtual machines. With convergence, fewer hardware resources deliver multiple capabilities and host multiple workloads.Monitoring these “anytime-anyplace” workloads creates a resource challenge, as there are a limited number of network access points.
A Case Study of Eurograbber: How 36 Million Euros was Stolen via Malware
This is a case study about a sophisticated, multi-dimensional and targeted attack that stole an estimated 36+ million Euros from more than 30,000 bank customers from multiple banks across Europe.
Symantec, Singapore school partner to nurture next-generation security talents
Symantec Corp. and the Singapore Management University will jointly train and equip IT security professionals with the latest knowledge and skill sets in information security.
Cisco Any Device vision drives competitiveness
This white paper discusses real Cisco experiences and results, and the steps and business decisions that information and security officers, enterprise IT, and information security architects should consider as they allow greater employee choice in endpoint devices.
Securing data and network as SaaS adoption grows
The adoption of SaaS presents a major challenge in managing access control. As more people work from more places outside of the organization and use more types of devices to access a wide range of apps and sensitive data, here's how you can maintain network and data security.
How Cisco IT provides remote access for small offices and telecommuters
At any given time, one-third or more of Cisco’s global workforce is connected by remote access. This case study describes how Cisco developed and deployed its Virtual Office solution and the business benefits that it gained.
RMH’s hospital of the future
RMH Healthcare (RMH) moved into its “hospital of the future” last year. Find out how Cisco Borderless Networks boosted its emergency response times and clinician responsiveness while complying with regulatory standards.