|
Protecting the Four Pillars: Physical, Data, Process, and Architecture At the end of October, Adobe Systems announced that data belonging to 38 million of its customers had been obtained by hackers, who’d infiltrated the company’s systems at least two months earlier, along with the source code for three of its products. The server that housed Adobe’s database also housed a PR Newswire database of customer logins and passwords, which hackers stole and leveraged for various additional exploits, such as uploading fraudulent press releases.... More Info |
|
| Download Contact Author Share |
Add Your Assets to the Research Center
Put your thought leadership materials where they can be found when your global target market is investigating companies, products, topics, trends, and technology related to your company.
UPLOAD CONTENTWelcome to Pipeline's Knowledge Center. You can use the search feature to search across all media contained on the Pipeline site including articles, brochures, reports, webinars, whitepapers, and much more.
To begin, use the search box above to search by topic, and then filter your results by media type, date, or company. You can also select how results appear by specifying how many results appear per page and sorting your results by media type, relevancy, or company.