More article whitepapers
This paper looks at the latest generation of enterprise tablets from HP, Dell and Lenovo and assesses their value enterprise proposition versus Apple's iPad.
Intel IT is proactively gathering data about Ultrabook devices and how they fit into the enterprise, in anticipation of a wave of new devices and form factors and the associated expectations who want to buy and use these devices at work.
In a competitive global market, responding to change efficiently is critical. Learn new solutions for global collaboration throughout the development lifecycle that can help effectively manage change and complexity in the development of smarter products.
The demand for smarter products continues to accelerate, requiring smarter development processes. This interactive guide introduces IBM's vision for designing, delivering, and managing smarter products.
Free Research and Reports
- Big Data: Architecting Systems at Speed - E2 Conference Boston
- Delve into technologies and business issues around mobile payments and wallets - Mobile Commerce World - Mobile Commerce World
- Learn how to enage customers through mobility - Mobile Commerce World - Mobile Commerce World
- Evaluating Emerging Technologies for the Enterprise - E2 Conference Boston
- How to Choose a SaaS Vendor - E2 Conference Boston
Dark Reading Digital Magazine
Time To Set Up That Honeypot
Securing Cisco IP Telephony
Attribution Is Much More Than A Source IP
New CA Group Has Big Names, Small Impact
How To Build An IT Security Budget
5 Approaches To Decaffeinating Java Exploits
Enterprise Vulnerabilities From DHS/US-CERT's National Vulnerability Database
Infotecs ViPNet Client 3.2.10 (15632) and earlier, ViPNet Coordinator 3.2.10 (15632) and earlier, ViPNet Personal Firewall 3.1 and earlier, and ViPNet SafeDisk 4.1 (0.5643) and earlier use weak permissions (Everyone: Full Control) for a folder under %PROGRAMFILES%\Infotecs, which allows local users to gain privileges via a Trojan horse (1) executable file or (2) DLL file.
Multiple cross-site scripting (XSS) vulnerabilities in Google Chrome before 27.0.1453.93 allow user-assisted remote attackers to inject arbitrary web script or HTML via vectors involving a (1) drag-and-drop or (2) copy-and-paste operation.
The XSS Auditor in Google Chrome before 27.0.1453.93 might allow remote attackers to obtain sensitive information via unspecified vectors.
Race condition in the workers implementation in Google Chrome before 27.0.1453.93 allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact via unknown vectors.
Use-after-free vulnerability in the media loader in Google Chrome before 27.0.1453.93 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors, a different vulnerability than CVE-2013-2840.