Spy vs. Spy

By Editor|2019-03-28T10:32:25+00:00July 6th, 2016|

Despite the recent bad press due to the Sony Pictures and Ashley Madison hacks, Harper Reed, head of commerce and self-identified hacker at Paypal offshoot Braintree, says that hackers are getting blamed by the media. [...]

Comments Off on Spy vs. Spy

Close the Door Behind You

By Editor|2019-03-28T10:31:21+00:00July 6th, 2016|

It’s always unfortunate when an employee leaves, whether on their own terms or with cause. It’s even more unfortunate when they leave taking valuable data with them. In an article in ITWorld, Ryan Francis talks [...]

Comments Off on Close the Door Behind You

Lessons Learned from the CSX Train Derailment

By Editor|2019-03-28T10:30:07+00:00July 6th, 2016|

Emergency management officials are reviewing the lessons learned from the Maryville train accident on July 5, 2015, where an acrylonitrile-carrying train derailed and leaked, evacuating 5,000 residents, according to The Daily Times. “We were fortunate [...]

Comments Off on Lessons Learned from the CSX Train Derailment

Hack My Car

By Editor|2019-03-28T10:28:57+00:00July 6th, 2016|

As cars become smarter, so too do the hackers that target them, writes Mark Gibbs in Network World. “Just imagine your own car traveling at speed and having your ability to steer, alter speed, and [...]

Comments Off on Hack My Car

What Not to Do When it Comes to Crisis Communications

By Editor|2019-03-28T10:27:51+00:00July 6th, 2016|

When it comes to crisis communications, there is such a thing as bad press. At mumbrella.com.au, Tony Jaques, director of crisis management firm Issue Outcomes Pty Ltd talked to US crisis expert Jonathan Bernstein to [...]

Comments Off on What Not to Do When it Comes to Crisis Communications

Through the Looking Glass

By Editor|2019-03-28T10:26:40+00:00July 6th, 2016|

Consulting firm Gartner has released its top 10 security predictions for network and data protection across five key areas of security concerns for businesses: threat and vulnerability management, application and data security, network and mobile [...]

Comments Off on Through the Looking Glass