Our crystal ball of ethics and compliance predictions has never been cloudier than at the end of 2011. Political priorities and public perceptions of institutions are traditionally predictive of the ethics and compliance environment. This year, however, inclement weather has been coming from all corners of the globe. In the absence of clear signals, the [...]
A combination of controls incorporated into a “defense in depth” strategy has the best chance of success. Defense in depth provides layers of controls so that if one control fails, others will still be in place to thwart the attack. When employing the defense in depth strategy, it is still important to consider the risk analysis to ensure the controls are appropriate for the risk environment.
What exactly is a DDoS attack? Can they be prevented, or at least mitigated in some way? And are they a legitimate threat to most businesses? This article answers these questions.
DDoS attacks are here to stay, but as Darren Hayes of Pace University explains, there are ways to reduce the threat.
An April 11, 2007 diplomatic dispatch released by WikiLeaks and published by the U.K. Guardian provides some interesting behind the scenes action that took place prior to the public announcement of the enforcement action against Baker Hughes.