X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 cyber curriculum


Smart Shoppers Go Abroad for Affordable Information Security Programs
Ernest Hemingway said,

cyber curriculum  Table 1. Graduate level cyber security programs abroad and their institutions. Institution Name Location Programs, Courses, and Laboratory Information Royal Holloway, University of London London, England MSc in Information Security MSc in Secure Electronic Commerce Smart Card Laboratory University of Amsterdam Amsterdam, Netherlands Java security and web security Cambridge University Cambridge, England Cryptography, algorithms Queensland University Brisbane, Australia Information Security Research Centre

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » cyber curriculum

The Elusive Goal of Supply Chain Visibility


Visibility continues to take center stage among many supply chain issues—as it has for more than a few years and is likely to for the foreseeable future. But what is this visibility issue, and why does it continue to be such an elusive goal for many companies to achieve? TEC Senior SCM Analyst Bob Eastman answers these questions and offers up some ideas on how to gain greater visibility into your company’s supply chain.

cyber curriculum   Read More

The Critical Importance of Three-dimensional Protection (3DP) in an Intrusion Prevention System


High-profile cyber-attacks are imprinted in the enterprise security worldview, and for good reason. Enterprises without sound intrusion prevention strategies across the three threat dimensions—undesired access, malicious content, and rate-based attacks—are exposed to unacceptable risks, especially from hybrid attacks. However, a three-dimensional protection (3DP) approach provides protection for clients, servers, and network infrastructure, while maximizing bandwidth for mission-critical traffic.

cyber curriculum   Read More

New DoD Regulations for the Cybersecurity Age: Implementing and Paying for the DFARS UCTI Safeguarding Contract Clause


The Department of Defense (DoD)’s acquisition clause on safeguarding unclassified controlled technical information (UCTI) affects DoD contractors of all sizes. Failure to comply with the requirements or to report a cyber incident now constitutes a breach and could result in fines or contract termination. Aronson’s white paper addresses many of the issues surrounding the new clause, including its implications for your business and how to comply.

cyber curriculum   Read More

6 Specialists, 6 Industry Domains: Trends for 2008 and 2009


In a survey on upcoming trends in employee management, the Learning Review asked six experts in six major industry domains one simple question: what do you think the main trends in [domain] will be for 2008 and 2009? Here are their answers.

cyber curriculum   Read More

Security Stocks Burn Rubber


Security technology stocks are burning rubber as they peel out in front of swaggering technology blue chips. Who are some of these security market leaders and what kinds of security products do they offer?

cyber curriculum   Read More

The Next R(E)volution of Lean


By seeing a business as a "value system" for customers, companies can shift lean strategic priorities towards growth-oriented targets instead of cost-cutting. Instead of squeezing additional margins to boost the bottom line, lean philosophy can increase demand response and sales, while maintaining and lowering cost per unit—thus enabling lower prices, a competitive edge, and more business.

cyber curriculum   Read More

An Indian’s view on the Chindian software outsourcing condition


I was positively staggered to read the article “Should North Americans Send More Software Development Work to China?” Perhaps my opinions are underlined with a bias of the South Indian (you’ll find Bangalore in those parts) variety, a fierce one at that too (which is why I have long abstained from writing the article “Why Indian outsourcing is the next best thing to sliced bread”). Nevertheless, I

cyber curriculum   Read More

Targeted Trojans Fool Your Most Experienced Users


Discover how in Targeted Trojans: The Silent Danger of a Clever Malware.

cyber curriculum   Read More

PegaWorld 2011 Revisited


How did Pegasystems avert disaster and become one of the fastest growing technology companies? The business process management (BPM) vendor started delivering software that users could change relatively easily. TEC Principal Analyst P.J. Jakovljevic takes a close look at Pega BPM and how this customer-centric software with its unique approach to process execution and modeling has contributed to Pegasystems’ success.

cyber curriculum   Read More

Malware Security Report


Learn how to protect your company in the VeriSign Malware Security Report.

cyber curriculum   Read More