SC Magazine 20/20: Repelling intruders

Cyberespionage: Myth versus reality
Cyberespionage: Myth versus reality

Repelling Intruders

Available on demand

Click here to register for FREE

Increasingly, attackers are having success by targeting weaknesses within client-oriented applications, exploiting these weaknesses through corrupted web sites and malicious content.  These attacks have affected organizations at every level, given the wide penetration of popular client applications on user desktops of all types.  Impacts have ranged from theft of intellectual property to breaches of personal privacy, and there looks to be little likelihood that these attacks will lessen in terms of frequency or damages. IBM's Jack Danahy reviews some of the newer threats over the last several months and discusses ways to mitigate against them.

Featured speakers

Illena Armstrong, editor in chief, SC Magazine
Jack Danahy, worldwide security executive, IBM

Sponsored by

close

Next Article in Editorial Webcasts

Sign up to our newsletters

More in Editorial Webcasts

APTs: The role of third-party apps

APTs: The role of third-party apps

Once an anomaly with which government agencies and some private companies that work with them had to deal, advanced persistent threats (APTs) are becoming a considerable problem for a spate ...

The new normal - APTs

The new normal - APTs

There's a saying in the security business these days: Either you've been compromised or you don't know you've been compromised. As advanced adversaries continually penetrate organizations of all sizes to ...

Guarding against a data breach

Guarding against a data breach

Our sixth-annual data breach survey, which polled IT security pros in the U.S. as well as those working in the U.K. and Australia, yielded interesting insights on how organizations are ...