Edward Snowden isn’t the NSA’s worst insider threat problem.
Check out the video interview with Jack Danahy on the 2013 Global Reputational Risk and IT Study and please leaving your ratings and feedback on the video landing page. https://ibm.biz/Bdxb3k
Here’s a case where a shared password is used to protect businesses all over town, and yet it seems to work. Why?
How a pair of missing pants taught me about audit, surveillance, and customer service and the implications for technology controls.
The 2012 IBM Tech Trends Report on skills gaps in business analytics, cloud computing, mobile technology, and social business and security’s role.
What kinds of security controls could have prevented the Skype account hijack attack? Can we do anything except rely on white hat penetration testing?
There are times when “security through obscurity” is a perfectly legitimate security control tactic, especially against opportunistic attackers.
Could the IT DMZ be used as a model for controlling payment card fraud and help protect against skimming attacks like those at Barnes and Noble?
Our common stereotypes of social engineering attacks don’t match up to the latest data in the Verizon 2012 Data Breach Investigations Report.
Can the rate of vulnerability disclosures of a platform predict its position on the Hype Curve?