Executive Resources

Trends for 2011: Botnets and Dynamic Malware

Source: Eset
Crimeware (malware related to computer crimes committed in order to gain financial profit) has proven its maturity by the increase in the number of malicious programs to which the term can be legitimately applied, as well as the increase in the proportion of this kind of malware to more traditional malicious code. This report reviews the main trends as regards malicious programs and antivirus security.



Related content:

Business Strategy: Thwarting Cyberthreats and Attacks Against Healthcare Organizations

A new IDC Health Insight study finds healthcare providers are top targets for cybercriminals, because health information is now the most valuable asset on the black market. Help protect your organization by learning how others are investing in their cyberstrategy and reviewing cybersecurity best practices.

Are Your Legacy Applications Suitable for the cloud? 3 Critical Evaluation Activities to Ensure Migration Success

Many enterprises are currently planning or are in the process of migrating their critical business applications to the cloud as the trend toward the hybrid enterprise continues to gather momentum. Even if a legacy application is deemed technically possible to migrate, without understanding the cost to the business and the performance ramifications for end users, the impact could be disastrous. Here are some factors that should influence cloud migration decisions for legacy applications.

Agile Data Masking: Toward a More Secure and Agile Enterprise

Data masking has long been a key component of enterprise data security strategies. However, legacy masking tools could not deliver secure data, undermining their impact. This white paper explores how data as a service can deliver on the promise of masking, while increasing organizational flexibility and agility.

Keeping Up with Production: How Agile Data Management Speeds Time to Market

Software development across industries is undergoing a constant revolution, driving toward more efficient processes, while data management is trapped with slow legacy systems. This document from Gleanster outlines how data as a service transforms data from drag to driver.

Agile Data Masking: Critical to Data Loss Prevention and Threat Reduction

Over the past several years data loss and data leaks have been a regular part of headline news. This surge in data leak activity has prompted many organizations to reevaluate their exposure to data leaks and institute automated, agile approaches to data masking. Well-implemented data masking secures data delivery and enhances compliance and security while accelerating data management processes.