Latest Whitepaper

Endpoint Detection And Response

By : ADP | Category : Cyber Security

With enough motivation, time and resources, adversaries eventually devise a way to get through an organization’s defenses. Unfortunately, when that occurs, most security products "fail silently,"... Read More

tags Security Threats Data Security Information Security

DSL-A .NET Implementation

By : ADP | Category : IT services

Domain specific languages (DSL) are around for quite some time and widely in use for software... Read More

tags Information Technology |Risk Management |Securities


By : lenovo | Category : IT services

While deploying a cloud application or subscribing to a cloud-based service may be relatively... Read More

tags Information Technology |Technology |Analytics

Making the Case for Strong Authentication

By : RSA | Category : Cyber Security

The risks associated with the use of password-only authentication are not new. In 1995, the US... Read More

tags cyber criminals |Information Technology |Data Security