Information Security Research Library

Powered by


Before attacking your company's systems, malicious hackers spend days and sometimes weeks surveying your network, befriending employees, and digging for any useful bit of information about your organization. Being aware of these threats and implementing proactive security measures to address potential vulnerabilities is essential for successfully protecting critical resources from data loss and leakage.

Watch this expert videocast and learn more about:

  • The ways that hackers use social networking sites to gain intelligence on potential targets
  • How to successfully keep your company's confidential information off the Web
  • Recognizing the early signs of attack surveillance
  • And much more


Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

Information Security Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.