|
Protecting the Four Pillars: Physical, Data, Process, and Architecture At the end of October, Adobe Systems announced that data belonging to 38 million of its customers had been obtained by hackers, who’d infiltrated the company’s systems at least two months earlier, along with the source code for three of its products. The server that housed Adobe’s database also housed a PR Newswire database of customer logins and passwords, which hackers stole and leveraged for various additional exploits, such as uploading fraudulent press releases.... More Info |
|
| More Info Download Contact Author Share |
|
Securing a VPN Against Advanced Malware Threats The virtual private network (VPN) represents an economical and efficient way for a company to communicate with remote employees, vendors and other partners by providing a secure method for those authorized users to access its corporate network.... More Info |
|
| More Info Download Contact Author Share |
|
Hacking 4.0: What will they hack next? On August 10, Marc Gilbert heard a voice coming from the bedroom of his two-year-old daughter, but it wasn’t his wife’s and it certainly wasn’t a lullaby. The voice belonged to a man with a British accent who had hacked into the Texas home to unleash a diatribe of explicit language.... More Info |
|
| More Info Download Contact Author Share |
|
Security Regulations: How to Innovate in a Global Environment Regulation and security have been closely connected since the beginning of modern civilization. It could even be argued that without proscription there would be no security.... More Info |
|
| More Info Download Contact Author Share |
|
Mobile's Security Problem Securing a mobile network is a bit like playing dodgeball in the dark: you know you’re going to get hit, but you have no idea when or from where. That presents real challenges for mobile network operators (MNOs) preparing for a future of revenues generated by services like mobile banking, healthcare and even connected cars, all of which demand highly secure environments.... More Info |
|
| More Info Download Contact Author Share |
Add Your Assets to the Research Center
Put your thought leadership materials where they can be found when your global target market is investigating companies, products, topics, trends, and technology related to your company.
UPLOAD CONTENTWelcome to Pipeline's Knowledge Center. You can use the search feature to search across all media contained on the Pipeline site including articles, brochures, reports, webinars, whitepapers, and much more.
To begin, use the search box above to search by topic, and then filter your results by media type, date, or company. You can also select how results appear by specifying how many results appear per page and sorting your results by media type, relevancy, or company.