Cybercrime, Cyberwars, Cyberterrorism and Hacktivism
Published: 14th December 2010 | By: Nigel Stanley
What exactly is the truth behind cybercrime, cyberwarfare, cyberterrorism and hacktivism? What do you need to know, and do, to deal with the problem?
Security challenges in the US healthcare sector - high costs and low technology investment plague the industry and create higher risks
Published: 8th December 2010 | By: Fran Howarth
This document outlines the key challenges faced in the US healthcare sector and describes some of the initiatives underway to overcome them.
EU Compliance and Regulations - for the IT Professional
Published: 26th November 2010 | By: Nigel Stanley
This paper highlights key directives and legislation as it affects the member states of the EU.
What’s Cool and Columns and Their Benefits - and how to extend their benefits
Published: 23rd November 2010 | By: Philip Howard
This paper defines what column-based relational databases do, and how, compared to traditional approaches.
Solvency II: data quality and governance
Published: 12th November 2010 | By: Philip Howard
The Solvency II Directive for insurance and reinsurance companies in the EU comes into force on December 31st 2012.
Single Customer View in Financial Services
Published: 21st October 2010 | By: Philip Howard
In this paper we will outline what a single customer view is and what the UK requirements are.
Investing in security versus facing the consequences - implementing DNSSEC to mitigate financial and brand risks
Published: 7th October 2010 | By: Fran Howarth
DNSSEC
Enabling in-database advanced analytics with Sybase IQ
Published: 17th August 2010 | By: Philip Howard
Whether it is to better understand customer behaviour, optimise your supply chain or to recognise and prevent fraud, it should be clear that there is significant value to be derived from advanced analytics and in-database analytics as a discipline.
3PAR Recovery Manager for VMware - to manage backup and recovery in a virtualised storage environment
Published: 10th August 2010 | By: Peter Williams
Managing virtualised servers with virtualised storage and its recovery needs a special approach - as 3PAR RMV shows
Why email and web security should be tied together - attacks increasingly targeted using blended threats
Published: 26th July 2010 | By: Fran Howarth
In an era where fast, efficient communication is vital, organisations need to pay more attention to web-based attacks-not merely those coming via email.