The Target incident is the tip of the iceberg because, depending on what studies you read, you'll find that most security breaches come from equipment that is not connected to the network.
Read Whole Story
The threat landscape has changed from noisy, messy worm attacks to stealthy, sophisticated, state-funded attacks, with major organizations such as Google, Microsoft, Apple, The New York Times and our government as victims.
Get top stories and blog posts emailed to me each day. Newsletters may offer personalized content or advertisements. Learn more.