What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Download now...

TippingPoint Hacktivist Survival Guide: Whitepaper

The last decade has seen the rise of crowd-sourced, activist-driven hacker groups.1 The term hacktivist has been coined to describe this group and refers to the nonviolent use of illegal or legally ambiguous digital tools in pursuit of political ends. Most notable of these hacktivist groups is Anonymous, a loose collective of individuals borne out of a cybersubculture that has gone mainstream.The goal of this paper is to provide a glimpse into the world of hacktivism and, more importantly, the group known as Anonymous.

File Type: .pdf


 

Related Items: To download additional items, select those you are interested in and click the submit button at the bottom of the page. You will be able to download the current item and any additional items you select.

Five Things to Consider When Evaluating Flash Storage: Asset

The performance benefits of all-flash storage might be clear, but there are other critical criteria when evaluating flash technology. Here are 5 insights that will help you ask the right questions during your evaluation.


ITES-3H: The New Face of Defense Contracts: Whitepaper

The most recent iteration of the U.S. Army’s IT Enterprise Solutions contract—ITES-3H—is a notable step forward in the evolution of this contract. After the ITES-2H contract, originally award in 2014, was extended several times and had more than $1 billion added to its ceiling, it was time for a new format. Under ITES-3H, the contract is open to other defense agencies, although the Army is expected to account for the majority of the awards. This special report will present a series of articles explaining the evolution of ITES, the broad reaching impact of the new contract, its impact of cybersecurity, and what’s next for this contract format.