- Faster Internet access means more cyberattacks for Africa
- Gurucul identifies cloud threats based on identity, behaviors
- Google, WordPress, LastPass, Salesforce - new USB token secures them all
- Attacks against industrial control systems double
- Pawn Storm cyberespionage group increases activity, targets NATO
Case studies - News, Features, and Slideshows
Melbourne-based software developer Halogenics is hoping within the next few months to have prototype versions of the next-generation of its Genotrack application.
Dealing with the explosion of devices on enterprise networks thanks to the use prevalence of mobile devices, including 'bring your own device' (BYOD) schemes, can be a headache for IT.
Snowy Hydro is exploring potential uses of wearable devices in its business following a rollout of Centrify identity management software.
Deduplication has help extend by at least by a year or two the storage hardware used for backups at retailer Vita Group, according to its IT manager.
Staff at Tasmanian not-for-profit, St Giles Society, were able to keep working through a power outage by accessing cloud-hosted emails.
Whitepapers about Case studies
This whitepaper is the third in a three-part series on distributed denial of service attacks (DDoS) and multi-tier DDoS protection. This section refers to case studies of different approaches to deploying protection architecture, including an enterprise customer scenario, an FSI customer scenario and an SMB customer scenario. The paper explains how these options should provide the flexibility and needed to combat the modern DDoS threat.