Thursday, January 8, 2015

The 2015 Social Engineering Survival Guide

How an acute shortage of cyber talent gave rise to 'spooks as a service' | Big Data and CRM Help Public Broadcaster Attract More Donors
January 08, 2015
INSIDER Alert
Your guide to the top content posted this week for Insider members
CIO

The 2015 Social Engineering Survival Guide

Despite being an integral aspect of many, if not most, major attacks, social engineering tactics always seem to go underappreciated by enterprise security teams. However, it’s often easier to trick someone into opening an email and exploiting a vulnerability that way, or convincing an unsuspecting assistant to provide a few useful bits of information, than it is to directly attack a web application or network connection. So, when attackers employ social engineering tactics, what exactly are they doing? Learn the latest here...

READ MORE
ITworld

How an acute shortage of cyber talent gave rise to 'spooks as a service'

Startups in areas like 'threat intelligence' and endpoint protection touted their executives' experience at three-letter agencies as a precursor to conversations about the scourge of advanced threats and attacks.Yet the big story about cyber talent that emerged in 2014 — at the RSA Security Conference and elsewhere - was of scarcity rather than abundance. Finding experts with experience identifying and analyzing sophisticated cyber threats is a herculean task. Hiring them is even harder, and few organizations can afford an internal team of cyber forensic experts to stand at the ready. To read this article in full or to leave a comment, please click here. READ MORE

CIO

Big Data and CRM Help Public Broadcaster Attract More Donors

Public TV and radio station WGBH wanted to build deeper relationships with current and potential members, but the Boston-area PBS and NPR affiliate couldn't easily analyze its donor data from within its Salesforce customer relationship management system. That put targeted marketing efforts beyond reach, says Cate Twohill, the station's senior director and managing partner for CRM services.Using RedPoint Global's Interaction and Data Management tools, Twohill's team mirrored the Salesforce data, to clean and analyze member information. Ultimately, WGBH wanted to find out which marketing programs appeal to which donors and to potential members. To read this article in full or to leave a comment, please click here. READ MORE

InfoWorld

Start here: A draft reimbursement policy for mobile users

It's one of the most frequent questions I get at conferences: How to manage all those users who want to -- or simply do -- use mobile devices and want that work usage reimbursed. This question usually comes up in the context of BYOD, but of course can also be raised in terms of company-provided devices -- meaning "Who gets those in the first place?"Although every company has its own requirements, employee-enablement bias, and context, there are core, equitable principles that every company can start from and modify for their own needs and culture. What follows is my proposed draft policy based on these principles. READ MORE

Network World

CheckPoint, Watchguard earn top spots in UTM shootout

When it comes to unified threat management appliances aimed at the SMB market, vendors are finding a way to fit additional security features into smaller and more powerful appliances. we reviewed six products: the Calyptix AccessEnforcer AE800, Check Point Software’s 620, Dell/Sonicwall’s NSA 220 Wireless-N, Fortinet’s FortiWiFi-92D, Sophos’ UTM SG125 and Watchguard Technologies’ Firebox T10-W. (Cisco, Juniper and Netgear declined to participate) Find out who the winners and losers are here. READ MORE

Get more Insider content from these brands:

CIO | ITworld | Computerworld | CSO | InfoWorld | Network World

You are currently subscribed to idge_insider_newsletter as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@idgenterprise.com

To contact us, please send an e-mail to online@idgenterprise.com

Copyright (C) 2015 IDG Enterprise
492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@idgenterprise.com. **

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.