There is a common theme running through many of the recent massive data breaches: cyber extortion. This new trend is gaining popularity on both corporate and individual level. To effectively combat this threat, a good understanding of the problem is necessary. This report will cover some common threats and case studies to raise awareness of the issue. Read More ▶ | | | White Paper: Tangoe Conflicting internal agendas and lack of measurements are the two biggest obstacles to success in mobility, according to a recent survey. Those are indicators of enterprises lacking mobile maturity. Read More ▶ | The C-suite is getting a little more crowded these days. Pull up a chair for the chief data officer, and it might be next to the CISO. Read More ▶ | | In his new book Lights Out: A Cyberattack, A Nation Unprepared, Surviving the Aftermath, Ted Koppel offers a lot of doomsday scenarios, but not enough facts to ensure that this is placed in the non-fiction section. Read More ▶ | | Symantec has seen a curious fusing of two pernicious online threats, which could cause a big headache if encountered by users. Read More ▶ | | | Google has been collecting information about schoolchildren's browsing habits despite signing a pledge saying it was committed to their privacy, the EFF said Tuesday. Read More ▶ | | eBook: AVI-SPL Companies that embrace the employee-driven shift toward a digital workplace will see a boost in productivity, as well as profits. Read More ▶ | | | |
0 comments:
Post a Comment