- Training Make Security Policies Harder to Read to Improve Retention?
- Product Management Low Price as a Differentiator for Cybersecurity Products
Low price can be a cybersecurity product differentiator in several ways: strengthening an ecosystem (Microsoft's free Windows Defender), as loss leaders bundled with other products, as freemium...
- Cloud Cloud Risks and the Security Community
Most cloud security risks apply to IT in general and either have mitigations or have been accepted. InfoSec's role should be active participation in technical innovation, balancing risk with cost—not...
- Social Networking Learning to Live with Social Networks: Risks and Rewards
Social networking changed how organizations interact with customers and individuals communicate. Understanding user motivations is essential—it's hard to discuss securing social network interactions...
- Cloud Top 10 Cloud Security Risks
Ten cloud-specific risks: lack of risk management framework, infrastructure sharing compromises, inconsistent controls in changing environments, loss of direct control, hypervisor exploitation,...
- Social Networking 2 Types of Social Media and Social Networking Risks for Enterprises
Enterprise social networking risks fall into two categories: risks to organizations using social platforms for marketing (brand tarnishing, impersonation, vulnerable infrastructure on untrusted turf)...