Remove resources enhanced-inbox-security-options
article thumbnail

Catches of the Month: Phishing Scams for March 2023

IT Governance

This month, we’re dedicating our feature to a topic that has been circling the cyber security sector – and many others besides – for some time: AI (artificial intelligence). Cyber security is no exception. Fighting fire with fire It’s not only the good guys that are using AI in the cyber security landscape.

Phishing 111
article thumbnail

Jive Clearspace 2.5: increasingly sophisticated social productivity tools | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. Oliver Marks Mobile RSS Email Alerts Comments Share Print Facebook Twitter Recommend Yahoo Buzz Digg Email Facebook Twitter StumbleUpon Reddit Home / News & Blogs / Collaboration 2.0 Hot Topics iPhone iPad Enterprise 2.0

Paper 59
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Two flavors of software as a service: Intuit QuickBase and Etelos | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. Oliver Marks Mobile RSS Email Alerts Comments Share Print Facebook Twitter Recommend Yahoo Buzz Digg Email Facebook Twitter StumbleUpon Reddit Home / News & Blogs / Collaboration 2.0 Hot Topics iPhone iPad Enterprise 2.0

article thumbnail

GE's Enterprise Collaboration Backbone | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. Oliver Marks Mobile RSS Email Alerts Comments Share Print Facebook Twitter Recommend Yahoo Buzz Digg Email Facebook Twitter StumbleUpon Reddit Home / News & Blogs / Collaboration 2.0 Hot Topics iPhone iPad Enterprise 2.0

Paper 74
article thumbnail

The Week in Cyber Security and Data Privacy: 15 – 21 April 2024

IT Governance

Compromised data includes names, passport numbers, Social Security numbers, online crypto account identifiers and bank account numbers. The guidance was designed for national security purposes, but can be applied by anyone bringing AI capabilities into a managed environment. To learn more about our research methodology, click here.