About 6 results
Open links in new tab
  1. Hacker tools and techniques: Underground hacking sites

    May 21, 2023 · Learn more about hacker attacks, tools and techniques, as well as the hacker underground, hacking groups, hacker sites and organized cybercrime.

  2. The cost of data breaches: Looking at the hard numbers

    In this tip, Khalid Kark explains the many different factors that should be part of the data breach cost calculation -- and it's more than just losing money. By Khalid Kark, Forrester Research Inc.

  3. Database Security Management-Enterprise Data Protection

    Learn more about database security gateways, database encryption, issues, threats, software, security gateways, how to detect database vulnerabilities.

  4. How do you align an IT risk assessment with COBIT controls?

    Mar 19, 2009 · Implementing a risk assessment that will align the COBIT control framework with risks is a valuable undertaking and a smart way to approach the challenge.

  5. Conficker-infected machines now number 7 million, Shadowserver finds

    The Conficker botnet now consists of 7 million Conficker infected machines, according to the Shadowserver Foundation. Investigators hunt for the Conficker authors, but it is increasingly unlikely ...

  6. Hacktivism examples: What companies can learn from the HBGary attack

    In one of the most blatant hactivism examples in recent memory, the group Anonymous compromised the security company HBGary Federal. Learn more about what took place in the HBGary attack and …