Fahmida Y. Rashid

Hacking: Exploiting Default of Guessable Credentials

Hacking: Exploiting Default of Guessable Credentials Attackers exploited default or easily guessable credentials for about 29 percent of the breaches analyzed by the Verizon RISK team. Many vendors often ship...

Learn From Past Incidents

Learn From Past Incidents Insider attacks are common enough that there will be repeat incidents. Take precautions so that the latest incident can't be repeated again. IT can write an...

NASA Repeatedly Attacked, Jet Propulsion Lab Compromised

The National Aeronautics and Space Administration was under heavy attack over the past two years, as adversaries tried to infect machines with malware or use advanced persistent threats to...

Data, Laws, Cyber-Weapons Biggest Threats to Information Security

The three biggest information security risks in 2012 are the rise of big data, ill-conceived regulations and the prospect of cyber-war, a prominent security expert told attendees at the...

Networks Offer Best Security for BYOD, Consumerization of IT: Cisco

Information security professionals are faced with two difficult questions when trying to secure the network. They can either lock down the network, or €œfree up€ the technology, according to...

Latest Posts

11 Best AI Finance Tools in 2024

Seeking cutting-edge AI finance tools? Explore our expert selection for 2024.

Top 9 Data Quality Software Tools & Solutions of 2024

Searching for top-notch data quality software? Discover our top 9 picks.

Businesses Investing in AI: An Industry Perspective

Leaders from WWT, Cisco, Intel, and NetApp share experiences on how their companies prepared for AI Investment

10 Best AI Video Generators 2024

Seeking the best AI video generators? 10 AI software solutions that are revolutionizing video in 2024.

GitHub Copilot vs. ChatGPT: Ultimate AI App Comparison

What sets GitHub Copilot and ChatGPT apart? A comprehensive AI app comparison.