Think twice the next time a contact tries to "friend" you on Facebook or "follows" you on Twitter. It may turn out to be an undercover fed looking to scrutinize your employment history or examine your personal references.
Social media aren't just coming - they're here. And senior leaders need to understand how to maximize Facebook, LinkedIn, Twitter and other popular sites, as well as how to protect their organizations from very real security risks.
In an exclusive interview, Prof. Sree Sreenivasan, Dean of Student Affairs at the...
Interview with Prof. Sree Sreenivasan of the Columbia Graduate School of Journalism
Social media aren't just coming - they're here. And senior leaders need to understand how to maximize Facebook, LinkedIn, Twitter and other popular sites, as well as how to protect their organizations from very real security...
From blogs to wikis, Facebook to Twitter, social media have taken over the workplace.
But how do security leaders manage social media before all these new tools and technologies become unmanageable?
Jerry Mechling is a prominent author and lecturer at the Harvard Kennedy School, and in an exclusive interview he...
Social media sites are changing the rules of job search, offering a new relationship-based approach that allows individuals and organizations to build communities through online profiles, affinity groups and networks of contacts.
Malware is increasingly sophisticated, and social media are the common new venues for attacks.
These are the headlines from the latest Cisco Annual Security Report. Patrick Peterson, Cisco senior fellow, offers highlights of the report, discussing:
Top trends and threats;
The risks to specific vertical...
FaceBook, Twitter, LinkedIn -- Social-networking sites are now used both as recruitment tools for new talent and as screening sites for potential employees. As such, information security professionals should be careful to cultivate the right image on these and other popular sites.
Federal rules now require institutions to manage their data so it can be produced quickly and completely if demanded by district court cases.
In this session Deputy CISO David Matthews will use his first-hand experience to provide your organization up to date information and documents on:
Compliance with Federal...