From social media abuse to data breaches to mobile malware and hacktivist activity, 2011 was filled with a vast array of security threats. It’s likely that this activity will only increase as 2012 begins. Michael Sutton, vice president of security research at Zscaler, has joined other prognosticators in identifying the top security threats in store for the coming year.
Ten Tips for Better BI Reporting As more employees in a company become responsible for decision-making, easy access to reporting and analysis has become paramount.
Gamification: How 'Kid' Games Transform Business Keep these elements in mind as you help develop and deploy training modules and initiatives.
Online Privacy Policies Are Lengthy, Complicated and Reveal Alarming Trends Existing policies are highly complex, lengthy and written in language that is confusing for the average person to understand.
When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ... More >>
Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ... More >>
IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ... More >>