Different day, same story
August 11th, 2010
Weaknesses in the software and applications used by corporations are the prime source for hackers to breach infrastructures, steal choice critical data and turn a profit in the sale or use of it. The exploitation of vulnerabilities that crop up because of corrupted websites or malicious content isn’t new, but there are various ways to confront the problems. IBM’s Ryan Berg reviews some of the persistent and common threats that take advantage of holes in organizations’ systems, reviewing for us why some attack methods – like remote code execution, SQL injection, or cross-site scripting – still exist and what some of the simple measures are that CSOs can use against them.
Illena Armstrong, editor in chief, SC Magazine
Ryan Berg, Senior Architect of Security Research, IBM