Sort Alphabetically

Best Practices for Dealing with Phishing and Next-Generation Malware

EXECUTIVE SUMMARY An attorney in the greater San Diego area opened an attachment in a phishing email that he thought was sent to him by the US Postal Service. The attachment installed malware on his computer, and shortly thereafter he found that $289,000 had been transferred from his firm’s account More >

Continuous Response

Overview In a recent cross-industry study1, nearly 40 percent of respondents reported having conducted between 26 to more than 500 forensic investigations over the past two years. Fifty-seven percent said they needed to “find and investigate incidents as they are occurring.” However, traditional incident response is tedious, time-consuming and imperfect. More >

Best Practices for Secure Remote Power Management

Overview Inside the data center exists the enterprises’ collective knowledge of products, research, services, customers, relationships and processes – keys to the firm’s ability to successfully compete in its field. Every enterprise has the ability to achieve a competitive advantage with its ability to marshal this information quickly and efficiently More >