Monthly Archives: February 2014

In the last week or so it has come to light that the way the Target Corporation attackers got into Target’s internal network was by using a vendor’s userID and password. The attackers first compromised the vendor’s corporate network. From … Continue reading

Posted in Biometrics, Botz Blog, Information Security | Tagged , , , , | 3 Comments

Did you ever think that the potential cost of a security breach is overstated by those who want to sell you security software or services? Well, no matter how you add it up,  the potential cost to Target during the … Continue reading

Posted in Botz Blog, Compliance, IBM i Security, Info Security Mgmt, Information Security | Tagged , , , , , , , , , | 1 Comment