Related Content
Can Innovation Be a Result of SMART Goals? Adopting innovation as a driving theme for an organization raises the important question of how best to set goals for achieving innovation. One of the popular philosophies of goal setting is better known as SMART goals, which stands for specific, measurable, attainable, relevant, and timely. |
||
Is It Time for Cloud Providers to Control Malware Distribution? A recent Quarterly Threat Intelligence Report by Solutionary has revealed some alarming numbers about malware distributors and their hosting providers. Rajini Padmanaban looks at whether hosting providers are proactively rooting out malware or if they may actually be a part of the problem. |
||
Does Facebook Run the Risk of Gradually Getting Cannibalized? It can be argued that Facebook is running the risk of getting cannibalized by newer competitors who are smart enough not to take Facebook head on—given its humongous size—but instead are attacking it feature by feature. Anuj Magazine examines the risk for Facebook. |
||
Take Charge of Your Online Identity Online networking is easier than ever, but this strength can be a threat if one’s online identity is not managed well. Organizations do their part to protect their users’ identities and privacy, but it is high time the user steps up to be his own tester in validating that he safeguards himself. |
||
Look for Cloud Certifications in 2014 The impact of the cloud on IT and business is unquestionable. Unfortunately, when it comes to hiring individuals with the correct skill-set or showcasing cloud proficiency to future employers, questions can arise in abundance. For the New Year we offer nine cloud certifications to look for in 2014. |
||
Target Investigating Security Breach of 40 Million Card Accounts Target is investigating a security breach where credit card and debit card information was stolen from millions of customers starting on Black Friday. The information was apparently stolen when customers swiped their cards at machines during checkout in stores. 40 million cards were compromised. |
||
The Most Memorable Security Breaches of 2013 This year may go down as the year of Internet security breaches. After all, it was only this year that people began to look over their shoulders at the NSA. However, the NSA wasn't responsible for all of this year’s most memorable security breaches. Read on for a 2013 roundup. |
||
NSA Uses Special Google Cookies to Aid in Surveillance In another news item released this week from the seemingly never-ending treasure trove that is the leaked Edward Snowden documents, details emerge of how the National Security Agency (NSA) is taking advantage of Google's cookies and other location data to help its surveillance operations. |