Risk Management stories - Page 190
Phishing example from ESET
Mon, 2nd Mar 2009
#
phishing
#
email security
#
risk & compliance
The scam is somewhat more elaborate than many we see, and it's worth a little analysis to see what flags we can extract from it for spotting a phisher at work.
Why perimeter security is not enough
Wed, 1st Oct 2008
#
ddos
#
risk & compliance
#
wireless networks
Mark Edmead stresses that effective security encompasses processes and people, not just tech, challenging outdated perimeter-focused strategies.
Hot High Margin Opportunities
Sun, 1st Oct 2006
#
supply chain
#
risk & compliance
#
notebook
Explore lucrative margins in tech: From MYOB software dominance to Kingston's reliability, there's gold in niche markets.