Half Sized Blog Element (Single Author Style)
Half Sized Blog Element (Multi Author Style)
SANSFIRE 2012 is coming to Washington, DC
SANSFIRE 2012 will take place at our Hilton Washington and Towers campus, July 6-15. There will be more than 40 SANS IT Security Training courses available. This training event is powered by the (ISC) Internet Storm Center and is an opportunity to meet the ISC handlers.
SC eSymposium: Cyber espionage
Cyber espionage – Those engaging in cyber espionage to steal classified and/or proprietary data from U.S. agencies and other organizations are riding high. Foreign spies, including U.S. allies, are increasingly launching digital assaults against the nation to steal sensitive economic secrets, according to a recent report by the U.S. Office of National Counterintelligence Executive. The theft of this critical information shows that attackers – state-sponsored or not – are enlisting whatever weaknesses in systems they can to steal corporate and government data, often going unnoticed for months. Experts share background on the types of attacks to watch out for and what to do to thwart them.
SANSFIRE 2012 is coming to Washington, DC
SANSFIRE 2012 will take place at our Hilton Washington and Towers campus, July 6-15. There will be more than 40 SANS IT Security Training courses available. This training event is powered by the (ISC) Internet Storm Center and is an opportunity to meet the ISC handlers.
SC eSymposium: Cyber espionage
Cyber espionage – Those engaging in cyber espionage to steal classified and/or proprietary data from U.S. agencies and other organizations are riding high. Foreign spies, including U.S. allies, are increasingly launching digital assaults against the nation to steal sensitive economic secrets, according to a recent report by the U.S. Office of National Counterintelligence Executive. The theft of this critical information shows that attackers – state-sponsored or not – are enlisting whatever weaknesses in systems they can to steal corporate and government data, often going unnoticed for months. Experts share background on the types of attacks to watch out for and what to do to thwart them.
