- Cloud Cloud Risks and the Security Community
Most cloud security risks apply to IT in general and either have mitigations or have been accepted. InfoSec's role should be active participation in technical innovation, balancing risk with cost—not...
- Social Networking Dealing With Brand Impersonations on Social Networks
Brandjacking—imposters impersonating company brands on social networks—can be used to gain consumer trust or tarnish reputations. Each major platform (Twitter, LinkedIn, Facebook, MySpace) has...
- Malware Honeypots as Part of a Modern IT Infrastructure
Honeypots are decoy systems designed to be attacked. They slow intruders, decrease false positives (any connection is suspicious), capture malware samples, and reveal attacker intentions. The main...
- Malware Key Challenges of Combating Malware in the Enterprise
Enterprise malware defense is harder than single-host protection due to diverse business needs preventing consistent controls, geographic dispersement creating visibility gaps, political complexities...
- Career Stop Relying on Your Resume
A resume gives employers what they need to reject you—designed to make you look like everyone else. If you promise to only use resumes late in the process, you'll motivate yourself to stand out...
- Social Networking Learning to Live with Social Networks: Risks and Rewards
Social networking changed how organizations interact with customers and individuals communicate. Understanding user motivations is essential—it's hard to discuss securing social network interactions...