- Career How to Research in Preparation For an IT Interview
Research interviewers and positions before IT job interviews. Insist recruiters provide more than generic postings; tap LinkedIn to find company employees in your network. Search for former employees...
- Assessments Dealing with Misinformation During Security Assessments and Forensic Investigations
Interview subjects don't always provide accurate information—they may not know details, remember incorrectly, or have incentives to mislead. Look for discrepancies between sources, ask similar...
- Malware Combating Malware in the Enterprise
- Cloud Top 10 Cloud Security Risks
Ten cloud-specific risks: lack of risk management framework, infrastructure sharing compromises, inconsistent controls in changing environments, loss of direct control, hypervisor exploitation,...
- Incident Response Could a Data Breach Actually Help the Affected Brand?
Research shows negative publicity can increase awareness for relatively unknown brands—negative book reviews increased sales for unknown authors. For breaches unrelated to a company's core purpose,...
- Social Networking 2 Types of Social Media and Social Networking Risks for Enterprises
Enterprise social networking risks fall into two categories: risks to organizations using social platforms for marketing (brand tarnishing, impersonation, vulnerable infrastructure on untrusted turf)...