The attack on TARGET: how was it done - lessons learned for protecting HP NonStop systems
The attack against target - how was it done and how has it changed the security landscape