Without naming names, Verizon provides a bit of background information on some of its most intriguing cases. Read More ▶ |
|
| White Paper: Ixia Complexity creates vulnerability. In today's threat landscape, true security requires reliable, current, and global intelligence - for both applications and threats. Read More ▶ | We will explore the issues of reputational damage, incident cost, stock price impact, and increased regulatory attention. We will also discuss the fate of four CEOs who have faced cybersecurity breaches in the past three years. Read More ▶ |
| Many vendors still allow hard-coded passwords to ship out with their products Read More ▶ |
| Name a city, pick a date, and you’ll likely find a nearby hackathon, whether you’re in Des Moines, Iowa, or Yerevan, Armenia. Read More ▶ |
| | Virtually everyone in technology knows about Kevin Mitnick, the one-time fugitive hacker who is now a security consultant. Mitnick has a wealth of security advice for the public. Read More ▶ |
| Generic top-level domains (TLDs) that have sprung up in recent years have become a magnet for cybercriminals, to the point where some of them host more malicious domains than legitimate ones. Read More ▶ |
| White Paper: Brocade Communications Systems Inc While business-critical workloads are very difficult to predict -- the one certainty is that they are increasing. This study shows how improving app workload performance reduces downtime, and makes for happier customers and more efficient staff. Read More ▶ |
|
|
|