Nov 11, 2014 | Security Management, Vulnerability Management
Attackers exploit weakness. This age-old concept applies equally to castles and battleships, as it does to applications and networks. The more vulnerabilities a network has, the easier it is to attack and compromise. Nearly all of the recent high-profile attacks...
Jun 24, 2014 | Risk Management
Data breaches are not all bad news. Sure, a data breach can be disastrous for a company. However, breaches can also provide valuable insight into the broken IT risk management and security practices of different organizations. The infamous Target breach is a...