Remove 12
Remove 2009 Remove Education Remove How To Remove Risk
article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

Part 3 will discuss how to manage the various DT risks. This discussion will include methods, tools, and techniques such as using personae and identifying use cases that have high business value, while minimizing project risks. first with bitcoin in 2009 and then other cryptocurrencies such as Ether and financial transactions.

article thumbnail

The Perils of Showboating | ZDNet

Collaboration 2.0

Windows 7 Microsofts Windows 7 arrived in late 2009 and kicked off a PC upgrade cycle thats expected to. Bringing this back to enterprise collaboration, there is a management reality that those who showboat in a corporate online collaboration community risk sanction from management. Hot Topics iPhone iPad Enterprise 2.0 Very true, ".charge

Paper 45
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Inside ‘Evil Corp,’ a $100M Cybercrime Menace

Krebs on Security

From 2009 to the present, Aqua’s primary role in the conspiracy was recruiting and managing a continuous supply of unwitting or complicit accomplices to help Evil Corp. Some tips from Europol on how to spot money mule recruitment scams dressed up as legitimate job offers. indep: Yeah. indep: Greetings. tank: [link].

article thumbnail

Microsoft Office Sharepoint Server: a next generation of deeper, wider content silos? | ZDNet

Collaboration 2.0

Windows 7 Microsofts Windows 7 arrived in late 2009 and kicked off a PC upgrade cycle thats expected to. World: How to Understand Where You Are Really at Risk and the Most Effective Ways to Protect Your Enterprise 2.0 Hot Topics iPhone iPad Enterprise 2.0 Microsoft Office Green tech Smart phones Collaboration 2.0

article thumbnail

How AI Could Write Our Laws

Schneier on Security

Consider, for example, a 2013 Massachusetts bill that tried to restrict the commercial use of data collected from K-12 students using services accessed via the internet. The bill appealed to many privacy-conscious education advocates, and appropriately so. Political scientist Amy McKay coined the term.

article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

Krebs wrote for The Washington Post between 1995 and 2009 before launching his current blog KrebsOnSecurity.com. Starting with her first desktop on a Unix machine at age 12, Eva Galperin’s contributions to cybersecurity include research on malware and privacy. Markstedter actively contributes to filling the infosec education gap.