Dyman & Associates Risk Management Projects on Staff editorial: The internet, is it a p... - 1 views
image
Auction site eBay has found itself in the midst of another security storm after apparently choosing to leave a security hole wide open - in the interests of user functionality - as customer details...
http://www.storagereview.com/seagate_backup_plus_fast_portable_review The Seagate Backup Plus Fast portable drive is performance-heavy mobile device that provides users a plethora of storage and i...
Its remarkable how much can change over the course of just a couple of years. We've seen bring-your-own-device (BYOD) evolve from a buzzword to an accepted practice with a strong business use case....
Prior to the modernisation of industry, managers were understandably primarily concerned with performance and cost. Workplace safety (WHS) unfortunately was often only considered when it affected ...
http://gcn.com/articles/2014/03/03/enterprise-risk-management.aspx Could enterprise risk management become a common cloud-based service at most government agencies? It's an idea being explored by ...
KUALA LUMPUR: National cybersecurity specialist agency CyberSecurity Malaysia today alerted the public to the dangers of 'cyber flirts', saying it is linked to a rising trend in cyber blackmail sca...
Cloud providers have attracted enterprise customers with the promise of rapid elasticity, on-demand provisioning, high availability and a pennies-per-hour pricing model. But there's just one proble...
Microsoft on Tuesday unveiled several upcoming Office 365 improvements, including mobile device management (MDM) and data loss protection (DLP) controls. The announcements were made during the Day...
Google has secured the lease of a NASA airbase in San Francisco for 60 years, possibly to house their upcoming space-exploration vehicles and robotics research. The agency's press release at Dyman...
Hackers have become very sophisticated over the past few years. Not only the recent attack on Target was tremendous, but it was also rather unusual because hackers attacked the company through thei...
The White House on Wednesday released the first version of its cyber security framework for protecting critical infrastructure. Critics say these voluntary guidelines enshrine the status quo. The ...
Twenty years after it embraced the internet, China has become a cyber-giant, but a weak one vulnerable to a skyrocketing number of threats. Since China formally became a member of the global...
Bitcoin is a currency forged through hardcore mathematics and buoyed by promises of financial liberation from banks. Its climb has been very thrilling. Many are embracing bitcoin as a viable mean...
View Source: http://www.fool.com/investing/general/2014/01/25/beware-this-984-credit-card-charge-isnt-as-harmles.aspx Credit-card scam artists are continually coming up with new scams, while impro...
Industry leaders and President Obama call the framework just a first step in creating a cybersecurity playbook for 16 US critical infrastructure sectors. But this is more than just a reference manu...
For many companies, security is still the greatest barrier to implementing cloud initiatives. But it doesn't have to be. Organisational pressure to reduce costs and optimise operations has led man...
For most businesses, spreadsheets offer a simple way to perform key business functions, such as accounting, data analysis or chart creation. But many of the user-friendly advantages of spreadsheets...