The Latest in IT Security

Posts Tagged ‘white hats’

At a recent “Hacker Lab” event, “white hat” hackers revealed how cybercriminals work – and what businesses can do to protect themselves. The multimedia presentation used a simulated small business system to demonstrate how hackers choose their targets, how they enter the system and what they do post-infiltration.

Read more ...

Part two of our three part series Anatomy of a Crimeware Syndicate. In part one we talked about the hierarchy and operations of a crimeware syndicate. Today we’re going to talk about the threat landscape that sustains crimeware and part three will look at solutions organizations can implement to reduce their risk.   Crimeware syndicates […]

Read more ...

In a recent BBC article, reputable security firm McAfee is quoted saying, “I’ve never hired computer hackers but that’s not to say I would never do that,” says Raj Samani, chief technical officer of McAfee Europe. Wow, I thought. Really? OK, I admit, hacker is one those terms whose definitions has blurred in the last […]

Read more ...


Categories

SUNDAY, FEBRUARY 23, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments