article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

The Last Watchdog

OneRep provides a consumer service that scrubs your personal information from Google and dozens of privacy-breaching websites. Here is Erin’s Q&A column, which originally went live on OneRep’s well-done blog.) For the first expert interview on our blog, we welcomed Pulitzer-winning investigative reporter Byron V.

article thumbnail

This is the old ChiefTech blog.: Another Web 2.0 service model risk blown away - Google and Postini

ChiefTech

This is the old ChiefTech blog. However, you need to come over and see my new blog at chieftech.com.au. Disclaimer: Information on this blog is of a general nature and represents my own independent opinion. blog I work at Headshift , a social media and social computing consultancy, as a Senior Business & Technical Consultant.

Risk 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

When Consumerisation and Cloud Services = Shadow IT

CGI

In a recent IDG survey it stated that of the respondents: 90% use consumer services such as Skype or LinkedIn of which 46% was shadow IT. 57% use enterprise social networking tools of which 40% was shadow IT and. 53% use CRM and Customer Service tools of which 23% was shadow IT. Add new comment.

Cloud 40
article thumbnail

This is the old ChiefTech blog.: An interview with Barney Twinkletoes from Santa about Enterprise Web 2.0

ChiefTech

This is the old ChiefTech blog. However, you need to come over and see my new blog at chieftech.com.au. Disclaimer: Information on this blog is of a general nature and represents my own independent opinion. Each skunkworks team member also started a blog and they implemented an Enterprise RSS system for the team.

article thumbnail

The Original APT: Advanced Persistent Teenagers

Krebs on Security

Microsoft blogged about its attack at the hands of LAPSUS$, and about the group targeting its customers. “They were calling up consumer service and tech support personnel, instructing them to reset their passwords. The Twitter hackers largely pulled it off by brute force, writes Wired on the July 15, 2020 hack.

Phishing 239
article thumbnail

What will be your decisive moment to secure your cloud applications in a Zero Trust world?

Thales Cloud Protection & Licensing

The study also revealed that 94% of IT professionals say their organizations’ security policies around access management was influenced by breaches of consumer services in the last 12 months. appeared first on Data Security Blog | Thales eSecurity.

Cloud 115
article thumbnail

In Praise of the Invisible DB2 for z/OS System

Robert's Db2

applications that access a target data server through a TCP/IP connection), via the IBM Data Server Driver (or DB2 Connect, though the former is recommended, as I pointed out in an entry posted to this blog a couple of months ago). I have more to say about this in an entry I posted to this blog a couple of years ago. And that's that.