Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

MALWARE AND VULNERABILITIES NEWS

Privacy, cybercrime and the law in a post-ransomware world

June 23, 2017 | JACK OW, INTELLECTUAL PROPERTY & TECHNOLOGY PARTNER, RHTLAW TAYLOR WESSING LLP

In an age where data has become a valuable commodity that is the object of cybercrime, organisations and cybersecurity professionals must work within applicable legal frameworks in preventing, detecting and responding to cybercrime and cyber-attacks.

Read more...

BLOGS AND OPINIONS

MALWARE AND VULNERABILITIES WHITE PAPERS

The Power of Analytic Visualization

SAS

Imagine a correlation matrix with 28 different variables. On a standard machine running normal hardware, a process like that can take four hours. With SAS Visual Analytics, it can run in about two seconds.

Download

A revolution in cloud networking

Citrix

This whitepaper explains how software-based architecture can enable businesses to leverage the network as an enabling technology; eliminate unused and under-utilized network resources, and build enterprise cloud networks while laying the foundation for service delivery fabrics.

Download

MULTIMEDIA