article thumbnail

First German Study about Costs of Data Breach Published

Hunton Privacy

In February 2009, the Ponemon Institute published the results of its inaugural study "Germany – 2008 Annual Study: Cost of a Data Breach." " The study is the first such research study undertaken in Germany, using data from actual incidents to estimate the costs of dealing with data breaches by German companies.

article thumbnail

GE's Enterprise Collaboration Backbone | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. bbbcd 07/18/2008 10:26 AM Reply to Flag Gartners and Forresters I think the Gartners and Forresters can address a product or products that can be used to achieve what GE has. Hot Topics iPhone iPad Enterprise 2.0

Paper 74
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

This is the old ChiefTech blog.: Social software in organisations: Nature or nurture?

ChiefTech

If you have counter experience or cases please let me know as it would surprise me to find them. However, some experts distinguish ease of use from ease of learning, especially when the design of a product involves a tradeoff between the two goals, or between ease of use and other goals such as security."

article thumbnail

Malwarebytes Endpoint Protection Product Review

eSecurity Planet

Malwarebytes Endpoint Protection is an endpoint security solution built to protect against advanced threats. Malwarebytes began as a product dedicated solely to protecting against malware when it was founded in 2008 in Santa Clara, CA. However, it has since expanded to act as a much more comprehensive security solution. .

article thumbnail

Types of Malware & Best Malware Protection Practices

eSecurity Planet

Rogue security software. Architect a premium network security model like SASE that encompasses SD-WAN , CASB , secure web gateways , ZTNA , FWaaS , and microsegmentation. In 2008, the Kraken botnet with 495,000 bots infected 10% of the Fortune 500 companies. Jump ahead: Adware. Bots and botnets. Browser hijacker.

Phishing 102
article thumbnail

A short history of intranets and what's next with social, mobile and cloud

ChiefTech

However, they had no intention of implementing any kind of sophisticated security or access control system. Ultimately the influence of this Internet technology innovation on intranets has been unavoidable - for example, Yammer was launched in 2008 , with the simply question: "What are you working on?".

Cloud 89
article thumbnail

Working internationally

CILIP

Even so, they were busy providing study space for students with nowhere else to work. Case Studies. ed by the 2008 financial crisis and in 2012. There is also an innovative proposal for a single virtual library presence for the whole of south Asia, with a strategy that is now being rolled out across the region.