Thursday, June 21, 2007

Mergers and acquisitions: Building up security after an M&A

Mergers and acquisitions are common headlines in today's information security world, and that's great news for malicious hackers and data thieves. When companies join forces, they often leave themselves open to attack. In this tip, contributor Ed Skoudis reviews the top merger-related threats and how to avoid them.

Thursday, June 07, 2007

Finding and blocking Web application server attack vectors

Web application server attacks are nothing new, but attackers are coming up with creative new ways to penetrate them. Information security expert Peter Giannoulis examines how data-hungry attackers are using Web application servers to crack into back-end databases, and offers advice on what can be done to protect Web infrastructures.

This page is powered by Blogger. Isn't yours?