Blog Posts Tagged with "Classification"
BYOD too Big for Twitter...
July 29, 2012 Added by:Boris Sverdlik
It's not a question of technology, it really isn't. The one problem that we keep running into is that user's don't want us installing things on their personal devices. It's the whole entitlement mentality that our users have somehow attained through all of our babying. That's the cost of using their resources...
Comments (1)
From Fraud to Infosec and Vice Versa... Part 2
April 23, 2012 Added by:Neira Jones
In my previous post I summarized fraud and how it relates to infosec. Key enablers used to defraud victims of all types cut across the landscape and often overlap, posing further challenges for quantifying their impact, but the classifications are nonetheless helpful...
Comments (0)
Most Liked
Latest Member Comments
Don’t Let Your Guard Down: Tragedies Pave ...
john flynn on 01-25-2021
Understanding Trust...
john flynn on 01-25-2021
Hacker to Release Symantec's PCAnywhere Sour...
Jerry Shaw on 10-05-2015
PoS Malware Kits Rose in Underground in 2014...
on 03-17-2015
Latest Posts
- GitHub Hires Former Cisco Executive Mike Hanley as Chief Security Officer
- Reddit Names Allison Miller as Chief Information Security Officer (CISO)
- SecurityWeek Names Ryan Naraine as Editor-at-Large
- Why Cyber Security Should Be at the Top of Your Christmas List
- United States Federal Government’s Shift to Identity-Centric Security
- How Extreme Weather Will Create Chaos on Infrastructure
- BSIMM11 Observes the Cutting Edge of Software Security Initiatives
- Sustaining Video Collaboration Through End-to-End Encryption
- Will Robo-Helpers Help Themselves to Your Data?
- Securing the Hybrid Workforce Begins with Three Crucial Steps