SC Magazine 20/20: Repelling intruders

Cyberespionage: Myth versus reality
Cyberespionage: Myth versus reality

Repelling Intruders

Available on demand

Click here to register for FREE

Increasingly, attackers are having success by targeting weaknesses within client-oriented applications, exploiting these weaknesses through corrupted web sites and malicious content.  These attacks have affected organizations at every level, given the wide penetration of popular client applications on user desktops of all types.  Impacts have ranged from theft of intellectual property to breaches of personal privacy, and there looks to be little likelihood that these attacks will lessen in terms of frequency or damages. IBM's Jack Danahy reviews some of the newer threats over the last several months and discusses ways to mitigate against them.

Featured speakers

Illena Armstrong, editor in chief, SC Magazine
Jack Danahy, worldwide security executive, IBM

Sponsored by

close

Next Article in Editorial Webcasts

More in Editorial Webcasts

Counter malware threats and protect your business

Counter malware threats and protect your business

The cyber security threats with which information security pros must contend run the gamut from web-based malware to application vulnerabilities. Both traditional and ever-new methods are being used by cyber ...

APTs: The role of third-party apps

APTs: The role of third-party apps

Once an anomaly with which government agencies and some private companies that work with them had to deal, advanced persistent threats (APTs) are becoming a considerable problem for a spate ...

The new normal - APTs

The new normal - APTs

There's a saying in the security business these days: Either you've been compromised or you don't know you've been compromised. As advanced adversaries continually penetrate organizations of all sizes to ...