ComputerWeekly.com Research Library

Powered by Bitpipe.com

Internal Threats Multimedia

  • Musings on the PSN Attack Vector

    Sponsored by: Veracode, Inc.

    Recently, there has been a lot of commentary around the breach of Sony’s PlayStation Network. Sadly, there has been no good discussion of how PSN was breached. Join Veracode's Security Researcher, Chris Lytle, as he explores the rumors in the marketplace regarding the Sony breach, and discusses the "probable vs. "possible" attack vectors.

  • IBM Application Security Solutions Demo

    Sponsored by: IBM

    IBM's application security solutions allow companies to preemptively and actively protect applications from external and internal threats, increase efficiencies, support compliance and improve an organization's overall security posture.

  • 2008 Verizon Business Data Breach Investigations Report

    Sponsored by: Verizon Business

    Check out this webcast to learn about the critical trends in data theft and learn about strategies for increasing your company's data security against internal and external attacks.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.