dcsimg

Social Media

Articles

Prediction: Social Impact of Cybersecurity Breakdowns

In 2018, we will see cybersecurity issues have a serious social impact. Security breakdowns will play a factor in our elections, in our relationships, and in our way of life. More >

Why I’ll Never Recommend AWS: The Danger of Draconian Policies in a Social World

With the advent of social media, screwing with customers can have severe repercussions. More >

Should You Avoid Social Media to Protect Your Future Career?

The things we are posting on social media today will be part of our file in the future and once in, we will likely never be able to get them out. More >

Zeus-Variation Terdot Targets Social Platforms

While Terdot is technically a banker trojan, like the original Zeus, this variation has the ability to spy on social media and email platforms. More >

Facebook, Slack and Google Add to Their Collaboration Platforms

In general, collaborative tools are growing more sophisticated. This was a big week for this evolution. More >

Twitter Hack Shows Dangers of Third-Party Access

Twitter has serious flaws that have led to hacked accounts that were then taken over by bad actors. More >

More Articles >

Interviews

Andreas Gal: Browsers Are Commoditized, But Differentiation Still Possible

No sector has changed as much as browsers during the past 15 years. Silk Labs CEO Andreas Gal has seen the drama unfold.

More >

Availability Issues, New Choices Fuel Argument to Lose Our Attachment to .com

When registering domains, should we forego the likes of .com, .org, and .net, and adopt generic extensions that are becoming increasingly common?

More >

How Online Retailers Use ‘Pop-Ups’ in the Physical World

Temporary brick-and-mortar extensions of online retail outlets pop up in various locations to give those retailers a means of providing a touch-and-feel experience to customers.

More >

More Interviews >

Most Popular Features

Time to Set Realistic AI Expectations Is Now

The gap between what senior business execs believe can be accomplished by investing in AI and what can be really accomplished using AI has widened to the point where a backlash against AI in the enterprise may be all but inevitable.

Now Comes the Hard Part of Cloud Computing

Given all the complexities involved, it is little wonder that so many organizations have found moving to the cloud a much bigger challenge than they might have originally anticipated.

Why Security Needs to Automate, Too

The same tools being used to augment the development and operations side of the house can also be applied to automation in security.

Editor's Choice
Related IT Downloads

Infra81.jpg Software Quality Assurance: Integrating Testing, Security, and Audit

This excerpt focuses on the conceptual aspects of defect management, including the basic concepts of a defect, how to mana...

DataM46 A Rational Foundation for Software Metrology

This report lays the foundation for a rational approach to software metrology, with the scope of the current effort being ...

Security28 Web Security: A WhiteHat Perspective

This excerpt from chapter 2 focuses on major browser security issues, including same-origin policy, sandboxing, malicious ...

Challenges and Benefits of a Methodology for Scoring Web Content Accessibility Guidelines (WCAG) 2.0 Conformance

This paper explores a methodology to score adherence of a web page to WCAG 2.0 conformance requirements.

...

More IT Downloads>

Subscribe Daily Edge Newsletters

Sign up now and get the best business technology insights direct to your inbox.