Half Sized Blog Element (Single Author Style)
Half Sized Blog Element (Multi Author Style)
When hackers get hacked: Secretive spy software team falls victim to attack
An informative article by Laura Hautala at c|net titled “When hackers get hacked: Secretive spy software team falls victim to attack”: It seems no one is safe on the Internet. The latest example: hackers claimed to breach the files of Italian spy software company Hacking Team and then used the company’s own Twitter account to broadcast […]
Cloud & The Security Skills Gap
An informative video on cloud and the security skill gap from Darkreading.com F5 Network security evangelist David Holmes offers concrete advice about how cloud outsourcing can help companies with a talent shortfall solve three enterprise security problems: application security, penetration testing, and bug bounties. To look at the video click here:
When hackers get hacked: Secretive spy software team falls victim to attack
An informative article by Laura Hautala at c|net titled “When hackers get hacked: Secretive spy software team falls victim to attack”: It seems no one is safe on the Internet. The latest example: hackers claimed to breach the files of Italian spy software company Hacking Team and then used the company’s own Twitter account to broadcast […]
Cloud & The Security Skills Gap
An informative video on cloud and the security skill gap from Darkreading.com F5 Network security evangelist David Holmes offers concrete advice about how cloud outsourcing can help companies with a talent shortfall solve three enterprise security problems: application security, penetration testing, and bug bounties. To look at the video click here:
