Inside the Briefcase

Driving Better Outcomes through Workforce Analytics Webcast

Driving Better Outcomes through Workforce Analytics Webcast

Find out what’s really going on in your business...

Legacy Modernization: Look to the Cloud and Open Systems

Legacy Modernization: Look to the Cloud and Open Systems

On the surface, mainframe architecture seems relatively simple: A...

Still keeping your hybrid power systems indoors?  It’s time for change.

Still keeping your hybrid power systems indoors? It’s time for change.

Mobile telecommunications network equipment is expected to work without...

As the Network Changes, Engineers Are Embracing the DevOps Model

As the Network Changes, Engineers Are Embracing the DevOps Model

Businesses that have embraced digital transformation with a clear...

The 5 Most Common Application Bottlenecks

The 5 Most Common Application Bottlenecks

Application bottlenecks can lead an otherwise functional computer or...

What Evil Lurks in the Hearts of Hactivists?

April 30, 2012 No Comments

SOURCE: TechNewsWorld

The specter of a hacktivist cyberattack is chilling to IT security pros, even though they don’t consider the methods hackivists typically use the most worrisome. “They were really more concerned about the types of attacks and the data that is more the target of cybercrime and cyberespionage,” said Harry Swerdlove, CTO of Bit9, the firm that surveyed the pros.

Read more… 

SECURITY

Leave a Reply

(required)

(required)


ADVERTISEMENT

bpm online Boston May 11

UC Expo

SSOW

sptechcon

ITBriefcase Comparison Report