Hacking: Exploiting Default of Guessable Credentials
Attackers exploited default or easily guessable credentials for about 29 percent of the breaches analyzed by the Verizon RISK team. Many vendors often ship...
Learn From Past Incidents
Insider attacks are common enough that there will be repeat incidents. Take precautions so that the latest incident can't be repeated again. IT can write an...
The National Aeronautics and Space Administration was under heavy attack over the past two years, as adversaries tried to infect machines with malware or use advanced persistent threats to...
The three biggest information security risks in 2012 are the rise of big data, ill-conceived regulations and the prospect of cyber-war, a prominent security expert told attendees at the...
Information security professionals are faced with two difficult questions when trying to secure the network. They can either lock down the network, or free up the technology, according to...
Company: Spectra Logic (data storage and data management solutions)
Company Description: Spectra Logic develops data storage and data management solutions that solve the problem of...
This week NVIDIA is holding its digital GPU Technology Conference (GTC). Historically, the event has been focused on developers, gamers, data scientists, auto manufacturers...