Looking ahead to the new year, Kristin Lovejoy of IBM says information security organizations face a host of global compliance issues - and the complexity of this challenge may be the biggest task of 2011.
Hemu Nigam says WikiLeaks founder Julian Assange has become akin to a "cyber messiah" And Assange's followers have proven: "If you turn your back on our messiah, we are going to take you down."
"Where mobile payments are concerned, I don't want to say banks will be taken to the cleaners, but I think that's where their biggest threat is," says Avivah Litan of Gartner.
The milTube video site is a companion to other military social networks housed behind the firewall, collectively known as milSuite, that furnishes secure Web 2.0 services such as those offered by Facebook, LinkedIn and Twitter.
Key factors making the security landscape riskier are the rapid rise of social networking, the growing reliance on cloud computing and the growing sophistication, criminalization and organization of hackers, a new survey shows.
Organizations today approach social media one of three ways: They embrace it, ignore it or are immobilized by it. The key to success is to manage the transition.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.