The Latest in IT Security

People Have War Stories Too

25
Jul
2014

We read about hacks and vulnerabilities all of the time. A retailer is successfully attacked via malware and credit cards are stolen. A credit card processing company is hacked via cross site scripting and credit cards are stolen. An online social media company is attacked through an SQL injection attack and usernames and passwords are stolen.

Comments are closed.

Categories

THURSDAY, MARCH 28, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments