SC Magazine 20/20: Different day, same story

SC Magazine 20/20: Different day, same story
SC Magazine 20/20: Different day, same story

Different day, same story

August 11th, 2010

2:00pmET/11:00pm PT

Click here to register for FREE

Weaknesses in the software and applications used by corporations are the prime source for hackers to breach infrastructures, steal choice critical data and turn a profit in the sale or use of it. The exploitation of vulnerabilities that crop up because of corrupted websites or malicious content isn't new, but there are various ways to confront the problems. IBM's Ryan Berg reviews some of the persistent and common threats that take advantage of holes in organizations' systems, reviewing for us why some attack methods – like remote code execution, SQL injection, or cross-site scripting – still exist and what some of the simple measures are that CSOs can use against them.

Featured speakers

Illena Armstrong, editor in chief, SC Magazine
Ryan Berg, Senior Architect of Security Research, IBM

Sponsored by

close

Next Article in Editorial Webcasts

Sign up to our newsletters

More in Editorial Webcasts

APTs: The role of third-party apps

APTs: The role of third-party apps

Once an anomaly with which government agencies and some private companies that work with them had to deal, advanced persistent threats (APTs) are becoming a considerable problem for a spate ...

The new normal - APTs

The new normal - APTs

There's a saying in the security business these days: Either you've been compromised or you don't know you've been compromised. As advanced adversaries continually penetrate organizations of all sizes to ...

Guarding against a data breach

Guarding against a data breach

Our sixth-annual data breach survey, which polled IT security pros in the U.S. as well as those working in the U.K. and Australia, yielded interesting insights on how organizations are ...