- Social Networking Learning to Live with Social Networks: Risks and Rewards
Social networking changed how organizations interact with customers and individuals communicate. Understanding user motivations is essential—it's hard to discuss securing social network interactions...
- Cloud Top 10 Cloud Security Risks
Ten cloud-specific risks: lack of risk management framework, infrastructure sharing compromises, inconsistent controls in changing environments, loss of direct control, hypervisor exploitation,...
- Social Networking 2 Types of Social Media and Social Networking Risks for Enterprises
Enterprise social networking risks fall into two categories: risks to organizations using social platforms for marketing (brand tarnishing, impersonation, vulnerable infrastructure on untrusted turf)...
- Malware What is an Exploit Kit?
Exploit kits are toolkits that automate exploitation of client-side vulnerabilities, targeting browsers and plugins like Adobe Reader, Java, and Flash. Key characteristics include ease of use by...
- Social Networking Information Security in the World of Social Media
- Cloud Security Risks to Consider When Adopting Cloud Services
Cloud risks stem from three characteristics: agility (rapidly-changing environments make consistent controls hard), sharing (compromise to one component affects neighbors), and outsourcing (loss of...