What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here

Download now...

TippingPoint Hacktivist Survival Guide: Whitepaper

The last decade has seen the rise of crowd-sourced, activist-driven hacker groups.1 The term hacktivist has been coined to describe this group and refers to the nonviolent use of illegal or legally ambiguous digital tools in pursuit of political ends. Most notable of these hacktivist groups is Anonymous, a loose collective of individuals borne out of a cybersubculture that has gone mainstream.The goal of this paper is to provide a glimpse into the world of hacktivism and, more importantly, the group known as Anonymous.

File Type: .pdf


Related Items: To download additional items, select those you are interested in and click the submit button at the bottom of the page. You will be able to download the current item and any additional items you select.

Big Data: The Path to Mission-Centric Analytics: Asset

Is your agency currently taking full advantage of existing data to improve decision-making, reduce risk, increase efficiencies and lowers costs? Download this comprehensive research report to discuss some of the results of a recent survey conducted by Beacon Technology Partners and underwritten by Unisys. This survey sheds light on the importance of big data analytics in meeting mandates, concerns about fully committing to the process, the types of robust tools agencies are using or considering, and what steps agencies will likely take to make big data analytics a reality.

Delivering on the Promise of Virtualization: Whitepaper

With budgets pressures increasing, agencies are looking for anything that can help them maintain mission capabilities. As virtualization technologies continue to prove their worth in providing cost savings, boosting performance and operating efficiencies, they are increasingly showing themselves to be an essential technology to help agencies meet their IT goals. Download this special report to learn more on the growth of virtualization, containers, and software-defined platforms.

Economy of Security

Security solutions can help government agencies drive economic vitality for their regions with security intelligence. What is not as widely considered is the fact that cyber and physical security breaches can have a negative effect on economic vitality. Read this paper to gain a better of understanding of the connection between economic vitality and security.