Search Results

Results 1-2 of 2 for Brian Kim

New Threat Report Finds Email Prime Vehicle for Malware

One way attackers hide their activities is through using covert channels, observed Brian Kime, a senior analyst with Forrester Research "They can use the DNS service to encode malicious commands inside a seemingly benign DNS request," he told TechNewsWorld. "Every enterprise h...

EXPERT ADVICE

How App Marketplaces Are Changing Software and the World

Leave it to a comic strip, published 18 months ago, to allude to what has become a radical change in how technology is being adopted in the consumer world. Still, very few have recognized how this aspect would fundamentally transform enterprise software. ...

How often do you receive an email that you suspect is fraudulent?
Loading ... Loading ...

CRM Buyer Channels