Tag Archives: security

The Meaning of Security Hype – The State of Security

The Meaning of Security Hype – The State of Security. via The Meaning of Security Hype – The State of Security.

Posted in Best Practices, Data, Network Control, Open Source, Privacy, Security, The Industry | Tagged , , , , , , , , , , | Leave a comment

Ghost-Hunting With Anti-Virus | FireEye Blog

Ghost-Hunting With Anti-Virus | FireEye Blog. via Ghost-Hunting With Anti-Virus | FireEye Blog.

Posted in Data, Network Control, Open Source, Privacy, Security | Tagged , , , , , , , , , , , , , | Leave a comment

The Heartbleed Hit List: The Passwords You Need to Change Right Now

The Heartbleed Hit List: The Passwords You Need to Change Right Now. via The Heartbleed Hit List: The Passwords You Need to Change Right Now.

Posted in Best Practices, Data, Network Control, Privacy, Production Tools & Tips, Security | Tagged , , , , , , | Leave a comment

Apple’s security flaws: Are you paranoid enough yet? | Vulnerability assessment – InfoWorld

Apple’s security flaws: Are you paranoid enough yet? via Apple’s security flaws: Are you paranoid enough yet? | Vulnerability assessment – InfoWorld. via Apple’s security flaws: Are you paranoid enough yet? | Vulnerability assessment – InfoWorld.

Posted in Security, The Industry | Tagged , , | Leave a comment

The IT Specialist Weekly

The IT Specialist Weekly. via The IT Specialist Weekly.

Posted in Best Practices, Network Control, Privacy, Production Tools & Tips, Security | Tagged , , , , , , , , , | Leave a comment

CSOs must adopt new risk management trends

CSOs must adopt new risk management trends. via CSOs must adopt new risk management trends.

Posted in Data Mapping, Litigation, Network Control, Privacy, Production Tools & Tips, Security, Uncategorized | Tagged , , , , , , , , , , | Leave a comment

Florida Supreme Court Juices Up E-Discovery Requirements : E-Discovery Bytes

Florida Supreme Court Juices Up E-Discovery Requirements : E-Discovery Bytes. via Florida Supreme Court Juices Up E-Discovery Requirements : E-Discovery Bytes.

Posted in Best Practices, Data, Data Mapping, Litigation, Network Control, Predictive Coding, Privacy, Production Tools & Tips, Search, Security, The Industry | Tagged , , , , , , , , , , , , , , , , , | Leave a comment

7 Ways To Make Your Staff More Security Aware – Forbes

7 Ways To Make Your Staff More Security Aware – Forbes. via 7 Ways To Make Your Staff More Security Aware – Forbes.

Posted in Best Practices, Data, Network Control, Privacy, Production Tools & Tips, Security, The Industry | Tagged , , , , , , , , , , , , , , | Leave a comment

Data Deluge: The Problem Is, You Can’t Keep Everything – Forbes

Data Deluge: The Problem Is, You Can’t Keep Everything – Forbes. via Data Deluge: The Problem Is, You Can’t Keep Everything – Forbes.

Posted in Best Practices, Data, Data Mapping, Litigation, Network Control, Privacy, Production Tools & Tips, Search, Security, The Industry | Tagged , , , , , , , , , , , , , , , , , , | Leave a comment

Technology: A practical approach to open source software licensing

Technology: A practical approach to open source software licensing. via Technology: A practical approach to open source software licensing.

Posted in Best Practices, Data, Data Mapping, Network Control, Open Source, Production Tools & Tips, Security, The Industry | Tagged , , , , , , , , , , , , , , , , , | Leave a comment