Posts tagged for “Social media”

If You Can’t Beat Them Join them – Being Social with ITSM
ITSM

Social technologies are integral to modern workspaces and your IT department will be well-served by harnessing the capabilities they bring. So how exactly can ‘social’ add value to your ITSM processes? How can you better meet the expectations of your users by leveraging social technologies?

Posted by: on December 31st, 2014


Word of the Day: Social Engineer
ClearPath

Your computer systems can have the best technical security in place and still be compromised through that Achilles heel of the modern enterprise: humans.

Posted by: on September 11th, 2014


Get the Conversation Flowing!
Financial Industry Insights

Social media is integral to the lives of customers and banks can no longer afford to stay away from it. This blog highlights how banks can wield social technologies to their advantage.

Posted by: on August 22nd, 2014


CMO Insights in the Retail Industry
Executive Conversations

Tech moves fast. Regulators, as a rule, do not. In one area after another we are seeing – or should expect to see – regulators metaphorically putting up the yellow flag.

Posted by: on January 15th, 2014


The Changing Role of the CMO in the Consumer-Driven World
Executive Conversations

This blog post gives a high-level overview of the way AWS approaches cloud security, in particular the data at rest and data in transit; identity management; and availability features of your data stored in the AWS Cloud.

Posted by: on January 3rd, 2014


Can Law Enforcement Keep Up With Technology?
Security

In this ever connected world, the public want to know that they and their data are being protected.

Posted by: on November 8th, 2011


Celebrities, Cybercrime, and the Courts
Security

How can government policy keep up with cyber security threats that cross national boundaries?How can government policy keep up with cyber security threats that cross national boundaries?How can government policy keep up with cyber security threats that cross national boundaries?How can government policy keep up with cyber security threats that cross national boundaries?How can government policy keep up with cyber security threats that cross national boundaries?How can government policy keep up with cyber security threats that cross national boundaries?

Posted by: on June 3rd, 2011


IT Security 2011: Risk Interlinked
Security

Four connected challenges facing IT departments this year.Four connected challenges facing IT departments this year.Four connected challenges facing IT departments this year.Four connected challenges facing IT departments this year.Four connected challenges facing IT departments this year.Four connected challenges facing IT departments this year.Four connected challenges facing IT departments this year.Four connected challenges facing IT departments this year.Four connected challenges facing IT departments this year.Four connected challenges facing IT departments this year.Four connected challenges facing IT departments this year.Four connected challenges facing IT departments this year.

Posted by: on January 27th, 2011


Identity theft is a 21st century epidemic
Security

Identity theft is a 21st century epidemic, and we need to face up to this fact quickly to have any hope of protecting ourselves.Identity theft is a 21st century epidemic, and we need to face up to this fact quickly to have any hope of protecting ourselves.Identity theft is a 21st century epidemic, and we need to face up to this fact quickly to have any hope of protecting ourselves.Identity theft is a 21st century epidemic, and we need to face up to this fact quickly to have any hope of protecting ourselves.Identity theft is a 21st century epidemic, and we need to face up to this fact quickly to have any hope of protecting ourselves.Identity theft is a 21st century epidemic, and we need to face up to this fact quickly to have any hope of protecting ourselves.Identity theft is a 21st century epidemic, and we need to face up to this fact quickly to have any hope of protecting ourselves.Identity theft is a 21st century epidemic, and we need to face up to this fact quickly to have any hope of protecting ourselves.Identity theft is a 21st century epidemic, and we need to face up to this fact quickly to have any hope of protecting ourselves.Identity theft is a 21st century epidemic, and we need to face up to this fact quickly to have any hope of protecting ourselves.Identity theft is a 21st century epidemic, and we need to face up to this fact quickly to have any hope of protecting ourselves.Identity theft is a 21st century epidemic, and we need to face up to this fact quickly to have any hope of protecting ourselves.

Posted by: on October 26th, 2010


In Case You Missed It
Security

If you’re not in the c-suite, you should forward this week’s articles to IT leadership. If you are IT leadership, these headlines highlight the reasons you should be concerned about consumerization...If you’re not in the c-suite, you should forward this week’s articles to IT leadership. If you are IT leadership, these headlines highlight the reasons you should be concerned about consumerization...If you’re not in the c-suite, you should forward this week’s articles to IT leadership. If you are IT leadership, these headlines highlight the reasons you should be concerned about consumerization...If you’re not in the c-suite, you should forward this week’s articles to IT leadership. If you are IT leadership, these headlines highlight the reasons you should be concerned about consumerization...If you’re not in the c-suite, you should forward this week’s articles to IT leadership. If you are IT leadership, these headlines highlight the reasons you should be concerned about consumerization...If you’re not in the c-suite, you should forward this week’s articles to IT leadership. If you are IT leadership, these headlines highlight the reasons you should be concerned about consumerization...If you’re not in the c-suite, you should forward this week’s articles to IT leadership. If you are IT leadership, these headlines highlight the reasons you should be concerned about consumerization...If you’re not in the c-suite, you should forward this week’s articles to IT leadership. If you are IT leadership, these headlines highlight the reasons you should be concerned about consumerization...If you’re not in the c-suite, you should forward this week’s articles to IT leadership. If you are IT leadership, these headlines highlight the reasons you should be concerned about consumerization...If you’re not in the c-suite, you should forward this week’s articles to IT leadership. If you are IT leadership, these headlines highlight the reasons you should be concerned about consumerization...If you’re not in the c-suite, you should forward this week’s articles to IT leadership. If you are IT leadership, these headlines highlight the reasons you should be concerned about consumerization...If you’re not in the c-suite, you should forward this week’s articles to IT leadership. If you are IT leadership, these headlines highlight the reasons you should be concerned about consumerization...

Posted by: on October 12th, 2010


We use cookies on this site. By using this site, you agree to our use of cookies. To change or learn more, see our Privacy Notice.