- Assessments Dealing with Misinformation During Security Assessments and Forensic Investigations
Interview subjects don't always provide accurate information—they may not know details, remember incorrectly, or have incentives to mislead. Look for discrepancies between sources, ask similar...
- Malware Combating Malware in the Enterprise
- Cloud Top 10 Cloud Security Risks
Ten cloud-specific risks: lack of risk management framework, infrastructure sharing compromises, inconsistent controls in changing environments, loss of direct control, hypervisor exploitation,...
- Incident Response Could a Data Breach Actually Help the Affected Brand?
Research shows negative publicity can increase awareness for relatively unknown brands—negative book reviews increased sales for unknown authors. For breaches unrelated to a company's core purpose,...
- Social Networking 2 Types of Social Media and Social Networking Risks for Enterprises
Enterprise social networking risks fall into two categories: risks to organizations using social platforms for marketing (brand tarnishing, impersonation, vulnerable infrastructure on untrusted turf)...
- Career 5 Interviewing Tips for IT Job Candidates
Five interviewing tips from a hiring manager's perspective: know the organization (business model, challenges, competition), know the position (specific requirements beyond generic titles), know...