Risk Management stories - Page 147
Securing the crossroads
Wed, 1st Jul 2009
#
malware
#
risk & compliance
#
cybersecurity
Co-ordinated effort needed to protect multi-enterprise applications from cybercrime and data loss, risking $US1 trillion.
Phishing example from ESET
Mon, 2nd Mar 2009
#
phishing
#
email security
#
risk & compliance
The scam is somewhat more elaborate than many we see, and it's worth a little analysis to see what flags we can extract from it for spotting a phisher at work.
The new security hurdles
Wed, 1st Oct 2008
#
data protection
#
dlp
#
risk & compliance
Web 2.0, mobile devices, and Gen Y's tech habits are reshaping business security landscapes, demanding new strategies for data protection.
Why perimeter security is not enough
Wed, 1st Oct 2008
#
ddos
#
risk & compliance
#
wireless networks
Mark Edmead stresses that effective security encompasses processes and people, not just tech, challenging outdated perimeter-focused strategies.
Hot High Margin Opportunities
Sun, 1st Oct 2006
#
supply chain
#
risk & compliance
#
notebook
Explore lucrative margins in tech: From MYOB software dominance to Kingston's reliability, there's gold in niche markets.