Fahmida Y. Rashid

Hacking: Exploiting Default of Guessable Credentials

Hacking: Exploiting Default of Guessable Credentials Attackers exploited default or easily guessable credentials for about 29 percent of the breaches analyzed by the Verizon RISK team. Many vendors often ship...

Learn From Past Incidents

Learn From Past Incidents Insider attacks are common enough that there will be repeat incidents. Take precautions so that the latest incident can't be repeated again. IT can write an...

NASA Repeatedly Attacked, Jet Propulsion Lab Compromised

The National Aeronautics and Space Administration was under heavy attack over the past two years, as adversaries tried to infect machines with malware or use advanced persistent threats to...

Data, Laws, Cyber-Weapons Biggest Threats to Information Security

The three biggest information security risks in 2012 are the rise of big data, ill-conceived regulations and the prospect of cyber-war, a prominent security expert told attendees at the...

Networks Offer Best Security for BYOD, Consumerization of IT: Cisco

Information security professionals are faced with two difficult questions when trying to secure the network. They can either lock down the network, or €œfree up€ the technology, according to...

Latest Posts

Oracle SVP Nipun Agarwal on MySQL HeatWave

I spoke with Nipun Agarwal, SVP of Research & Advanced Development at Oracle, about the advances in MySQL HeatWave, and his forecasts the future...

AI vs. Algorithms

Algorithms: they have become something of a “can’t live with them, can’t live without them,” aspect of modern life. They impinge on our daily...

Deloitte’s David Linthicum on Supercloud

I spoke with David Linthicum, Chief Cloud Strategy Officer at Deloitte Consulting, about supercloud technology, and how companies can navigate the cloud skills gap. Among...

eWEEK TweetChat, October 18: Optimizing Your Data Analytics Practice

On Tuesday, Oct. 18, at 11 AM PT, @eWEEKNews will host its monthly #eWEEKChat. The topic will be Optimizing Your Data Analytics Practice, and...

Remote IT Monitoring Product Review: RF Code Sentry

Earlier this year, I interviewed Jonathan Guy, VP of Engineering for RF Code regarding its new Sentry product, which promises to make management of...