| | | INSIDER Alert | | Your guide to the top content posted this week for Insider members | | | | CIO Despite being an integral aspect of many, if not most, major attacks, social engineering tactics always seem to go underappreciated by enterprise security teams. However, it’s often easier to trick someone into opening an email and exploiting a vulnerability that way, or convincing an unsuspecting assistant to provide a few useful bits of information, than it is to directly attack a web application or network connection. So, when attackers employ social engineering tactics, what exactly are they doing? Learn the latest here... | | ITworld Startups in areas like 'threat intelligence' and endpoint protection touted their executives' experience at three-letter agencies as a precursor to conversations about the scourge of advanced threats and attacks.Yet the big story about cyber talent that emerged in 2014 — at the RSA Security Conference and elsewhere - was of scarcity rather than abundance. Finding experts with experience identifying and analyzing sophisticated cyber threats is a herculean task. Hiring them is even harder, and few organizations can afford an internal team of cyber forensic experts to stand at the ready. To read this article in full or to leave a comment, please click here. READ MORE | | CIO Public TV and radio station WGBH wanted to build deeper relationships with current and potential members, but the Boston-area PBS and NPR affiliate couldn't easily analyze its donor data from within its Salesforce customer relationship management system. That put targeted marketing efforts beyond reach, says Cate Twohill, the station's senior director and managing partner for CRM services.Using RedPoint Global's Interaction and Data Management tools, Twohill's team mirrored the Salesforce data, to clean and analyze member information. Ultimately, WGBH wanted to find out which marketing programs appeal to which donors and to potential members. To read this article in full or to leave a comment, please click here. READ MORE | | InfoWorld It's one of the most frequent questions I get at conferences: How to manage all those users who want to -- or simply do -- use mobile devices and want that work usage reimbursed. This question usually comes up in the context of BYOD, but of course can also be raised in terms of company-provided devices -- meaning "Who gets those in the first place?"Although every company has its own requirements, employee-enablement bias, and context, there are core, equitable principles that every company can start from and modify for their own needs and culture. What follows is my proposed draft policy based on these principles. READ MORE | | Network World When it comes to unified threat management appliances aimed at the SMB market, vendors are finding a way to fit additional security features into smaller and more powerful appliances. we reviewed six products: the Calyptix AccessEnforcer AE800, Check Point Software’s 620, Dell/Sonicwall’s NSA 220 Wireless-N, Fortinet’s FortiWiFi-92D, Sophos’ UTM SG125 and Watchguard Technologies’ Firebox T10-W. (Cisco, Juniper and Netgear declined to participate) Find out who the winners and losers are here. READ MORE | | | |
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.