Remove books
article thumbnail

Book Excerpt: Recognize Their Attacks

Data Breach Today

A Chapter of the New Book 'Heuristic Risk Management' by Michael Lines Michael Lines is working with ISMG to promote awareness of the need for cyber risk management, and the CyberEdBoard is posting draft chapters from his upcoming book, "Heuristic Risk Management: Be Aware, Get Prepared, Defend Yourself."

Risk 243
article thumbnail

Book Excerpt: Building an Effective Defense

Data Breach Today

A Chapter of the New Book 'Heuristic Risk Management' by Michael Lines Michael Lines is working with ISMG to promote awareness of the need for cyber risk management, and the CyberEdBoard is posting draft chapters from his upcoming book, "Heuristic Risk Management: Be Aware, Get Prepared, Defend Yourself."

Risk 259
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Recognize the Threats, Part 2 - Book Excerpt

Data Breach Today

Part 2 of a Chapter of the New Book "Heuristic Risk Management" by Michael Lines Michael Lines is working with ISMG to promote awareness of the need for cyber risk management. As a part of that initiative, CyberEdBoard posts draft chapters from his upcoming book, "Heuristic Risk Management: Be Aware, Get Prepared, Defend Yourself."

Risk 242
article thumbnail

"Pwned", the Book, is Finally Here!

Troy Hunt

which I've now included in this book 😊 These are the stories behind the stories and finally, the book about it all is here: I announced the book back in April last year after Rob, Charlotte and I had already invested a heap of effort before releasing a preview in October. This book has it all. Pat Phelan.

Passwords 143
article thumbnail

The Big Payoff of Application Analytics

That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

Airline Booking System Exposed Passenger Details

Data Breach Today

Vulnerability Highlights Poor Security Controls for Passenger Name Records Airline booking system provider Amadeus - whose system is used by 500 airlines - is investigating a software vulnerability that exposed passenger name records, which is the bundle of personal and travel data that gets collected when booking a flight.

Security 256
article thumbnail

Hackers Exploit Multiple Bugs in Hotel Booking Platform

Data Breach Today

Financially Motivated Hackers Deploy Custom Malware Financially motivated hackers developed custom malware to exploit a likely zero-day flaw in popular vacation resort management software, say security researchers. Hackers target the hospitality industry with regularity, given the massive amounts of personal and payment data inside the sector.

Security 282
article thumbnail

7+ Graphics Libraries to Enhance Your Embedded Analytics

This e-book details a number of graphics libraries plus a few bonus tools to modernize your embedded dashboards. If your embedded analytics are looking stale, leverage these free graphics libraries to take your embedded analytics offerings above and beyond.

article thumbnail

The Hitchhiker’s Guide to Embedded Analytics – 4 Mission-Critical Steps to Take on Your Analytics Journey

Based on insights derived from industry professionals, this e-book uses first-hand experiences to help inform your analytics strategy. If you’ve been wondering how to invest in analytics, this research-based guide will take you through the 4 steps to finding the right solution for your application that will drive the most value.

article thumbnail

Insiders' Guide to Self-Service Analytics

This e-book describes the contrast in user experience between customizable self-service analytics and one-size-fits-all self-service analytics and what these options mean for your application and your business.

article thumbnail

Monetizing Analytics Features: Why Data Visualizations Will Never Be Enough

Think your customers will pay more for data visualizations in your application? Five years ago they may have. But today, dashboards and visualizations have become table stakes. Discover which features will differentiate your application and maximize the ROI of your embedded analytics. Brought to you by Logi Analytics.

article thumbnail

A Page From an Information Professional’s Book of Secrets: The Right Time to Deploy Your AI

Speaker: Dick Stark and Casey Steenport

There’s no mistake about it: AI is on the rise. 70% of business decision-makers, information management professionals, and IT experts say that employees focus on more meaningful work with AI compared to those without it.

article thumbnail

Insights on Choosing an Identity Verification Solution Provider

Using a questionnaire that captures your unique needs, combined with a discussion of the identity verification landscape, this e-book should give you some needed perspective when searching for a provider. Finding a strong identity verification solution provider is key in today’s threat environment, which is why we’ve created a guide to help.