SC Magazine 20/20: Different day, same story

Share this article:
SC Magazine 20/20: Different day, same story
SC Magazine 20/20: Different day, same story

Different day, same story

August 11th, 2010

2:00pmET/11:00pm PT

Click here to register for FREE

Weaknesses in the software and applications used by corporations are the prime source for hackers to breach infrastructures, steal choice critical data and turn a profit in the sale or use of it. The exploitation of vulnerabilities that crop up because of corrupted websites or malicious content isn't new, but there are various ways to confront the problems. IBM's Ryan Berg reviews some of the persistent and common threats that take advantage of holes in organizations' systems, reviewing for us why some attack methods – like remote code execution, SQL injection, or cross-site scripting – still exist and what some of the simple measures are that CSOs can use against them.

Featured speakers

Illena Armstrong, editor in chief, SC Magazine
Ryan Berg, Senior Architect of Security Research, IBM

Sponsored by

This material may not be published, broadcast, rewritten or redistributed in any form without prior authorization. Your use of this website constitutes acceptance of Haymarket Media's Privacy Policy and Terms & Conditions