Available on demand
Increasingly, attackers are having success by targeting weaknesses within client-oriented applications, exploiting these weaknesses through corrupted web sites and malicious content. These attacks have affected organizations at every level, given the wide penetration of popular client applications on user desktops of all types. Impacts have ranged from theft of intellectual property to breaches of personal privacy, and there looks to be little likelihood that these attacks will lessen in terms of frequency or damages. IBM’s Jack Danahy reviews some of the newer threats over the last several months and discusses ways to mitigate against them.
Illena Armstrong, editor in chief, SC Magazine
Jack Danahy, worldwide security executive, IBM