- Product Management Low Price as a Differentiator for Cybersecurity Products
Low price can be a cybersecurity product differentiator in several ways: strengthening an ecosystem (Microsoft's free Windows Defender), as loss leaders bundled with other products, as freemium...
- Social Networking Negative Sentiment May Help Search Engine Optimization
An online store owner deliberately provoked negative feedback to increase links and PageRank—search engines didn't differentiate negative discussions from positive ones. This highlights the need for...
- Malware 5 Common Malware Infection Approaches
Five common infection vectors: client-side exploits (browser, PDF, Office), server-side network vulnerabilities, social engineering to trick users into installing malware, propagation via USB drives...
- Cloud Cloud Risks and the Security Community
Most cloud security risks apply to IT in general and either have mitigations or have been accepted. InfoSec's role should be active participation in technical innovation, balancing risk with cost—not...
- Social Networking Dealing With Brand Impersonations on Social Networks
Brandjacking—imposters impersonating company brands on social networks—can be used to gain consumer trust or tarnish reputations. Each major platform (Twitter, LinkedIn, Facebook, MySpace) has...
- Malware Honeypots as Part of a Modern IT Infrastructure
Honeypots are decoy systems designed to be attacked. They slow intruders, decrease false positives (any connection is suspicious), capture malware samples, and reveal attacker intentions. The main...