Protect Your Critical Assets

McAfee explains how the targeted Aurora attacks at Google and other companies worked and offers some possible counter-measures.


You Can't Detect What You Can't See: Illuminating the Entire Kill Chain

On-Demand Webinar

McAfee: In this white paper, researchers from McAfee detail the six-step process that allowed hackers to gain access to company servers in recent, well-publicized attacks. It lays much of the blame for the problem on software configuration management (SCM) systems that were not properly secured. It exposes the security flaws contained in some of the most popular SCMs and offers countermeasures for closing up the security holes.

0 Comments (click to add your comment)
Comment and Contribute


(Maximum characters: 1200). You have characters left.



IT Management Daily
Don't miss an article. Subscribe to our newsletter below.

By submitting your information, you agree that datamation.com may send you Datamation offers via email, phone and text message, as well as email offers about other products and services that Datamation believes may be of interest to you. Datamation will process your information in accordance with the Quinstreet Privacy Policy.