Remove 2002 Remove Case Study Remove Government Remove Security
article thumbnail

A short history of intranets and what's next with social, mobile and cloud

ChiefTech

However, they had no intention of implementing any kind of sophisticated security or access control system. But on intranets, managers spent the following decade trying to use a combination of governance and centralised managed tools such as Web content management systems (WCMS), portals and enterprise search to tame the intranet.

Cloud 89
article thumbnail

The Hacker Mind Podcast: Ethical Hacking

ForAllSecure

The US Justice Department says it will no longer prosecute good-faith security researchers, but what constitutes good-faith security research? Instead, the US government did, saying quote Stealing is stealing whether you use a computer command or crowbar and whether you take documents data or dollars. Is hacking a crime?

IT 52
article thumbnail

A short history of intranets and what next with social, mobile and cloud

ChiefTech

However, they had no intention of implementing any kind of sophisticated security or access control system. But on intranets, managers spent the following decade trying to use a combination of governance and centralised managed tools such as Web content management systems (WCMS), portals and enterprise search to tame the intranet.

Cloud 40