Showing 3 results for: July 2013 ×

Ebook: Inside A Hacker's Playbook -- 10 Targeted Techniques That Will Break Your Security

As criminal hackers come up with more and more ingenious ways to take over Internet users' devices, break into corporate networks and steal sensitive information, keeping track of their methods becomes harder every day. How do they do research about their victims? What tactics do they use to home in on their targets to steal specific information? How do they keep themselves under the IT security radar?

Media Outlet Gets Hacked (On Purpose)

It only took an embroidered hat and polo shirt for Trustwave’s Senior Security Consultant Philip Pieterse to gain access to a media outlet’s offices, systems and private data. Posing as a telecommunications engineer, Pieterse walked into an office full of people, sat down at the Managing Director’s desk and downloaded a sensitive file. The Managing Director’s colleagues noticed Pieterse but didn’t say anything because they didn’t want to cause a stir.

Infographic: Finding Big Benefits in Big Data

You have a huge amount of information living in and across your systems – structured data, unstructured data, sensitive data, compliant data, and more. From enterprise databases to Facebook posts, what if you could take your data in all its various forms, apply the right analytics to it, and then use it to better secure your business, become more efficient, and even drive more revenue as a result of that knowledge?