Posts tagged for “Social media”

Security

Celebrities, Cybercrime, and the Courts

June 3rd, 2011

How can government policy keep up with cyber security threats that cross national boundaries?How can government policy keep up with cyber security threats that cross national boundaries?How can government policy keep up with cyber security threats that cross national boundaries?How can government policy keep up with cyber security threats that cross national boundaries?How can government policy keep up with cyber security threats that cross national boundaries?How can government policy keep up with cyber security threats that cross national boundaries?

Continue reading...

Security

IT Security 2011: Risk Interlinked

January 27th, 2011

Four connected challenges facing IT departments this year.Four connected challenges facing IT departments this year.Four connected challenges facing IT departments this year.Four connected challenges facing IT departments this year.Four connected challenges facing IT departments this year.Four connected challenges facing IT departments this year.Four connected challenges facing IT departments this year.Four connected challenges facing IT departments this year.Four connected challenges facing IT departments this year.Four connected challenges facing IT departments this year.Four connected challenges facing IT departments this year.Four connected challenges facing IT departments this year.

Continue reading...

Security

Identity theft is a 21st century epidemic

October 26th, 2010

Identity theft is a 21st century epidemic, and we need to face up to this fact quickly to have any hope of protecting ourselves.Identity theft is a 21st century epidemic, and we need to face up to this fact quickly to have any hope of protecting ourselves.Identity theft is a 21st century epidemic, and we need to face up to this fact quickly to have any hope of protecting ourselves.Identity theft is a 21st century epidemic, and we need to face up to this fact quickly to have any hope of protecting ourselves.Identity theft is a 21st century epidemic, and we need to face up to this fact quickly to have any hope of protecting ourselves.Identity theft is a 21st century epidemic, and we need to face up to this fact quickly to have any hope of protecting ourselves.Identity theft is a 21st century epidemic, and we need to face up to this fact quickly to have any hope of protecting ourselves.Identity theft is a 21st century epidemic, and we need to face up to this fact quickly to have any hope of protecting ourselves.Identity theft is a 21st century epidemic, and we need to face up to this fact quickly to have any hope of protecting ourselves.Identity theft is a 21st century epidemic, and we need to face up to this fact quickly to have any hope of protecting ourselves.Identity theft is a 21st century epidemic, and we need to face up to this fact quickly to have any hope of protecting ourselves.Identity theft is a 21st century epidemic, and we need to face up to this fact quickly to have any hope of protecting ourselves.

Continue reading...

Security

In Case You Missed It

October 12th, 2010

If you’re not in the c-suite, you should forward this week’s articles to IT leadership. If you are IT leadership, these headlines highlight the reasons you should be concerned about consumerization...If you’re not in the c-suite, you should forward this week’s articles to IT leadership. If you are IT leadership, these headlines highlight the reasons you should be concerned about consumerization...If you’re not in the c-suite, you should forward this week’s articles to IT leadership. If you are IT leadership, these headlines highlight the reasons you should be concerned about consumerization...If you’re not in the c-suite, you should forward this week’s articles to IT leadership. If you are IT leadership, these headlines highlight the reasons you should be concerned about consumerization...If you’re not in the c-suite, you should forward this week’s articles to IT leadership. If you are IT leadership, these headlines highlight the reasons you should be concerned about consumerization...If you’re not in the c-suite, you should forward this week’s articles to IT leadership. If you are IT leadership, these headlines highlight the reasons you should be concerned about consumerization...If you’re not in the c-suite, you should forward this week’s articles to IT leadership. If you are IT leadership, these headlines highlight the reasons you should be concerned about consumerization...If you’re not in the c-suite, you should forward this week’s articles to IT leadership. If you are IT leadership, these headlines highlight the reasons you should be concerned about consumerization...If you’re not in the c-suite, you should forward this week’s articles to IT leadership. If you are IT leadership, these headlines highlight the reasons you should be concerned about consumerization...If you’re not in the c-suite, you should forward this week’s articles to IT leadership. If you are IT leadership, these headlines highlight the reasons you should be concerned about consumerization...If you’re not in the c-suite, you should forward this week’s articles to IT leadership. If you are IT leadership, these headlines highlight the reasons you should be concerned about consumerization...If you’re not in the c-suite, you should forward this week’s articles to IT leadership. If you are IT leadership, these headlines highlight the reasons you should be concerned about consumerization...

Continue reading...