Remove 2008 Remove Case Study Remove IT Remove Security
article thumbnail

First German Study about Costs of Data Breach Published

Hunton Privacy

In February 2009, the Ponemon Institute published the results of its inaugural study "Germany – 2008 Annual Study: Cost of a Data Breach." " The study is the first such research study undertaken in Germany, using data from actual incidents to estimate the costs of dealing with data breaches by German companies.

article thumbnail

GE's Enterprise Collaboration Backbone | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. bbbcd 07/18/2008 10:26 AM Reply to Flag Gartners and Forresters I think the Gartners and Forresters can address a product or products that can be used to achieve what GE has. Hot Topics iPhone iPad Enterprise 2.0

Paper 74
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

This is the old ChiefTech blog.: Social software in organisations: Nature or nurture?

ChiefTech

If you have counter experience or cases please let me know as it would surprise me to find them. However, some experts distinguish ease of use from ease of learning, especially when the design of a product involves a tradeoff between the two goals, or between ease of use and other goals such as security." Confused employees.

article thumbnail

Malwarebytes Endpoint Protection Product Review

eSecurity Planet

Malwarebytes Endpoint Protection is an endpoint security solution built to protect against advanced threats. Malwarebytes began as a product dedicated solely to protecting against malware when it was founded in 2008 in Santa Clara, CA. However, it has since expanded to act as a much more comprehensive security solution. .

article thumbnail

Types of Malware & Best Malware Protection Practices

eSecurity Planet

Rogue security software. Architect a premium network security model like SASE that encompasses SD-WAN , CASB , secure web gateways , ZTNA , FWaaS , and microsegmentation. In 2008, the Kraken botnet with 495,000 bots infected 10% of the Fortune 500 companies. Jump ahead: Adware. Bots and botnets. Browser hijacker.

Phishing 105
article thumbnail

Working internationally

CILIP

Even so, they were busy providing study space for students with nowhere else to work. Case Studies. THE British Council is an outward-looking organisation, which exists to ?create create friendly knowledge and understanding between the people of the UK and other countries? not everyone has access to the internet.

article thumbnail

A short history of intranets and what's next with social, mobile and cloud

ChiefTech

However, they had no intention of implementing any kind of sophisticated security or access control system. In fact, the eventual aim was to allow what we would now recognise as wiki-style authorship of content because: "Making it easy to change the web is thus the key to avoiding obsolete information.". Information publishing and sharing.

Cloud 89