Quick Post
jdodge
How do you assess technology risk? When do you assess it? There's plenty of methodologies that do this and I've linked to a several documents below, one a risk …
Would you like to comment on this content? Log in or Register
HP Security Strategists

By HP security strategist Cindy Cullen

(1)
   
Joel Shore  This is likely where we need to go. Clearly, protection levels for programs and for data have repeatedly been shown to b… more »
JoelShore
ThuPham
Ten thousand American Airlines, and three dozen United Airlines, accounts were targets of fraud, with criminals reusing credentials to access customer loyalty r…
(1)
   
Joel Shore  True enough, these particular loyalty programs were hit, and hit bigtime. But, security problems are everywhere. Imagine more »
JoelShore
jdodge
CIO has a spot-on commentary describing how cyber criminals are closely watching how the U.S. will respond to the Sony hack. Indeed, I wrote a couple of days ag…
(6)
   
(2) (2)
Joel Shore  Picking a fight with the bad guys would likely open up a business to being an even bigger target, as every hacker on the… more »
JoelShore
@genedelibero
@genedelibero
Ron Callari
JoelShore
Paul Korzeniowski