TITLE

IBM Engineer Gets Paid to Hack

AUTHOR(S)
Brown, Karen
PUB. DATE
June 2005
SOURCE
Wireless Week;6/1/2005, Vol. 11 Issue 12, p46
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Profiles Guy Denton, a partner in the security practice of IBM and head of Big Blue's worldwide ethical hacking group. Job description of IBM ethical hackers; Information on the project of the group for a government client; Goal of the group.
ACCESSION #
17202155

 

Related Articles

  • Trick of the net fends off hackers. Fox, Barry // New Scientist;3/13/2004, Vol. 181 Issue 2438, p22 

    Hacker attacks designed to bring down Web sites for days or weeks on end may have met their match, if an idea being patented by IBM Corp. can be made to work. In what is called a distributed denial of service (DDoS) attack, the hacker infects a large number of personal computers with a virus...

  • Technology: IN BRIEF.  // Computer Weekly;11/7/2006, p24 

    The article presents news briefs related to the computer industry. International Business Machines Corp. has developed a systems management product, Virtualisation Manager, which enable companies to discover, monitor and manage virtual and physical computing resources from a common portal....

  • IBM Internet Security Systems X-Force Research Team Predicts Security Trends for 2007.  // Software World;Jan2007, Vol. 38 Issue 1, p25 

    The article announces various predictions for the top security trends of 2007 by IBM Internet Security Systems X-Force Research Team. The team forecasts broader and additional targeted identity theft attacks on consumers as well as an increase in vital and risky vulnerabilities in enterprise and...

  • IBM Report: Stealthy, Targeted Online Attacks Continue To Grow In 2007.  // Software World;Sep2007, Vol. 38 Issue 5, p17 

    The article reports on statistics which explores the growth of malicious software (malware) volume and sophistication in exploit leasing in Great Britain. Based on the 2006 International Business Machines Corp.'s (IBM's) X-Force research and development team, providers managed to purchase...

  • IBM calls for global co-operation in shifting security environment. Richards, Justin // Computer Weekly;2/7/2006, p1 

    The article states that International Business Machines Corp. (IBM), in its "2005 Global Business Security Index Report," calls for global co-operation in shifting security environment. According to the report, the global information technology threat remained at a medium level for most of 2005....

  • Be Wary of Microsoft Office Attachments.  // Database & Network Journal;Jun2007, Vol. 37 Issue 3, p24 

    The article reports that IBM's Internet Security Systems (ISS) X-Force research and development team has provided protection for customers against several serious flaws announced by Microsoft. The most significant Microsoft revelation is a vulnerability it its Exchange Server that can allow...

  • IBM cautions of mobile, cloud security issues. Greene, Tim // Network World;4/4/2011, Vol. 28 Issue 7, p16 

    The article announces the advisory coming from International business Machines (IBM) Corp. which cautioned information technology (IT) staff to look over the use of mobile devices and cloud infrastructure on business networks due to its vulnerabilities. According to IBM, Internet attackers have...

  • Untitled. Savvas, Antony // Computer Weekly;11/20/2007, p65 

    The article reports that International Business Machines Corp. has introduced software to help customers protect their business from web application security attacks. IBM said web applications are high value targets for hackers, yet many organisations have a difficult time tackling security due...

  • IBM's SecureWay to encryption. Moeller, Michael // PC Week;10/28/96, Vol. 13 Issue 43, p37 

    Informs that IBM announced its SecureWay Cryptographic Infrastructure, a framework for a new high-level security platform. The product's features; The release of a series of tool kits and development environments to enable the integration of high-level encryption and services into applications;...

Share

Read the Article

Other Topics