Trending on CBR
Are Proxy Anonymizers Putting Your Enterprise in Peril?
Like many modern threats to enterprise security, the use of proxy anonymizers is largely part of a behavioural issue. Chances are, your company...
The Human Factor in Laptop Encryption: UK Study
Encryption is one of the most important security tools in the defense of information assets. Ponemon Institute has conducted numerous studies on...
Justifying IT Security - Managing Risk and Keeping Your Network Secure
The goal of a security program is to choose and implement cost effective countermeasures that mitigate the vulnerabilities that will most likely...
The Changing Nature of Web Security Threats
This paper considers how Web-based security threats are evolving, within the context of IT trends including mobile, home computing and other forms...
Polycom - Telepresence, Voice and Video Conferencing Solutions
Companies choose Polycom for solutions that enable their geographically dispersed workforces to communicate and collaborate more effectively and...
Red Hat - Leading Provider of Open Source Enterprise IT Products and Services
Red Hat is at the forefront of open source software development for enterprise IT, delivering a broad portfolio of products and services for...
BCS - Enabling the Information Society
Established in 1957, BCS, The Chartered Institute for IT, promotes wider social and economic progress through the advancement of information...
Procorre - Professional IT and Computer Consultancy
Procorre consultancy provides IT and technology strategy solutions to maximise performance of clients' IT assets and investments.