Dyman Associates Management The political science of cybersecurity V: Why running hacke... - 1 views
image
http://www.darkreading.com/risk/how-to-get-the-most-out-of-risk-manageme/240165618 Even with most security budgets growing or at least staying flat for 2014, no organization ever has unlimited fun...
View Source: http://www.fool.com/investing/general/2014/01/25/beware-this-984-credit-card-charge-isnt-as-harmles.aspx Credit-card scam artists are continually coming up with new scams, while impro...
A large percentage of the American population no longer trusts mainstream news outlets either on television or in print. A June 2013 Gallup poll indicates nearly 4 out of 5 Americans among younger ...
http://www.storagereview.com/seagate_backup_plus_fast_portable_review The Seagate Backup Plus Fast portable drive is performance-heavy mobile device that provides users a plethora of storage and i...
Its remarkable how much can change over the course of just a couple of years. We've seen bring-your-own-device (BYOD) evolve from a buzzword to an accepted practice with a strong business use case....
Auction site eBay has found itself in the midst of another security storm after apparently choosing to leave a security hole wide open - in the interests of user functionality - as customer details...
We've all heard of this before: a hacker releasing a certain number of passwords and usernames, presumably just for the lulz. But this time, we're talking about 10 million records posted by no less...
View Source: http://www.usatoday.com/story/tech/columnist/saltzman/2014/01/23/norton-mobile-security-devices-app-review/4800223/ Android is on track to surpass one billion users across all devices...
A Project Management Office (PMO) is a group or department within a business, agency or enterprise that defines and maintains standards for project management within the organization. The pr...
Prior to the modernisation of industry, managers were understandably primarily concerned with performance and cost. Workplace safety (WHS) unfortunately was often only considered when it affected ...
As fresh graduates descend from the ivory tower (bearing their unstained diplomas), many will eventually encounter "real world" interactions for the very first time, and they run the risk of being ...
Hackers have become very sophisticated over the past few years. Not only the recent attack on Target was tremendous, but it was also rather unusual because hackers attacked the company through thei...
A new cartoon created by John Cook illustrates the failure of climate contrarians to manage global warming risks http://www.theguardian.com/environment/climate-consensus-97-per-cent/2014/mar/04/ca...
http://www.utilityproducts.com/articles/2014/03/safety-products-web-based-driver-risk-management.html Utility vehicles: Alert Driving, a provider of web-based driver risk management solutions, has...
http://gcn.com/articles/2014/03/03/enterprise-risk-management.aspx Could enterprise risk management become a common cloud-based service at most government agencies? It's an idea being explored by ...
For many companies, security is still the greatest barrier to implementing cloud initiatives. But it doesn't have to be. Organisational pressure to reduce costs and optimise operations has led man...