Cyberespionage: Myth versus reality
Cyberespionage: Myth versus reality

Repelling Intruders

Available on demand

Click here to register for FREE

Increasingly, attackers are having success by targeting weaknesses within client-oriented applications, exploiting these weaknesses through corrupted web sites and malicious content.  These attacks have affected organizations at every level, given the wide penetration of popular client applications on user desktops of all types.  Impacts have ranged from theft of intellectual property to breaches of personal privacy, and there looks to be little likelihood that these attacks will lessen in terms of frequency or damages. IBM's Jack Danahy reviews some of the newer threats over the last several months and discusses ways to mitigate against them.

Featured speakers

Illena Armstrong, editor in chief, SC Magazine
Jack Danahy, worldwide security executive, IBM

Sponsored by