will smartphones need retina scans before you use?
Articles
July 30, 2012
Link to will smartphones need retina scans before you use?the rising risk of customer satisfaction #OBL12
Articles
July 23, 2012
Link to the rising risk of customer satisfaction #OBL12the importance of configuration management roles in building your CMDB
Articles
July 17, 2012
Link to the importance of configuration management roles in building your CMDBLinkedIn password file disclosure: the biggest social engineering attack ever?
Articles
June 22, 2012
Link to LinkedIn password file disclosure: the biggest social engineering attack ever?cloud computing: a challenge for intrusion prevention systems
Articles
June 18, 2012
Link to cloud computing: a challenge for intrusion prevention systemssurf anonymously on your iPhone or Android phone using Tor
Articles
March 06, 2012
Link to surf anonymously on your iPhone or Android phone using Torhow do you evaluate a password's strength?
Articles
January 31, 2012
Link to how do you evaluate a password's strength?social networks - what are risks and implications for IT security?
Articles
January 24, 2012
Link to social networks - what are risks and implications for IT security?HELP! I'm becoming a project sponsor... what do I need to do?
Articles
January 05, 2012
Link to HELP! I'm becoming a project sponsor... what do I need to do?choosing an email address for security incidents
Articles
December 13, 2011
Link to choosing an email address for security incidentscorporate Twitter accounts: protect your image!
Articles
November 22, 2011
Link to corporate Twitter accounts: protect your image!