The Latest in IT Security

2015: The Year Data Theft Got Real

09
Mar
2016

Padlock and credit cards on top of laptop

In our 2015 predictions, “The Invisible Becomes Visible,” Raimund Genes, our Chief Technology Officer (CTO), said that in 2015 “Increased cyber activity will translate to better, bigger, and more successful hacking attempts.”

Now that 2015 has passed, we can look back and take the measure of the truth of that prediction. As you’ll see in our 2015 Annual Security Roundup “Setting the Stage: Landscape Shifts Dictate Future Threat Response Strategies” 2015 was indeed the year of “better, bigger and more successful hacking attempts,” certainly from the standpoint of attacks against and theft of data.

Read More

Leave a reply


Categories

FRIDAY, APRIL 19, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments