How Browser Exploits Lead to Web 2.0 Hacking

Watch Now Registration not required

Executive Summary

Gone are the days when URL Filtering took care of all the issues that arise from a company's Internet bound traffic. With Web 2.0, dynamic and user-generated content is becoming the norm and hackers are using browser exploits to create backdoors. Every employee launching an Internet browser can open a gate into the enterprise network. These backdoors create a daunting list of new challenges: Active Content/Malicious Code, Botnets, Phishing Attacks, Liablous blog postings, Data leakage and more.... And security and network managers are expected to tackle these growing problems with a shrinking budget and with fewer people.

  • Format: Webcast
  • Size: 0 KB