One way attackers hide their activities is through using covert channels, observed Brian Kime, a senior analyst with Forrester Research "They can use the DNS service to encode malicious commands inside a seemingly benign DNS request," he told TechNewsWorld. "Every enterprise h...
Leave it to a comic strip, published 18 months ago, to allude to what has become a radical change in how technology is being adopted in the consumer world. Still, very few have recognized how this aspect would fundamentally transform enterprise software. ...
Social CRM
See all Social CRM