Understanding Targeted Attacks: What Are We Really Up Against?
- — Feb. 15, 2013, 6:46 p.m.
Most of the things our industry has learned about targeted attacks were realized the hard way: through analysis of successful attacks. Our realizations have so far revealed just how unfamiliar we are with the “battle ground” we are currently in, and how that unfamiliarity has caused the industry to be unable to understand what is [...]Read the full article
Sign up now »
Embrace BYOD and gain full control, visibility and security of your mobile devices in a single endpoint solution
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.