Conversations: What are the top takeaways from the Uber data breach?
See all conversation search results provided by ITKE.
SearchSecurityDec 29, 2015
ComputerWeeklyDec 10, 2015
SearchNetworkingNews Jan 14, 2016
ComputerWeeklyJan 08, 2016
SearchCIOManage Jan 26, 2016
According to one statistic, as of July 2015 there were, in total, almost 4 million applications available on the app stores of Amazon, Apple, BlackBerry, Google and Windows. This figure is only one reflection of ... Continue Reading
SearchSecurityNews Nov 23, 2015
SearchCIOEvaluate Jan 08, 2016
A data breach plan that addresses the many variations a hack can take should consider these eight points. Continue Reading
SearchCIOEvaluate Jan 06, 2016
When your organization plans out how to handle a data breach, managing public perception should be given special consideration. One piece of advice: Don't play the victim. Continue Reading
ComputerWeeklyOct 12, 2015
SearchSecurityNews Dec 04, 2015
Hackers arrested by the Chinese government are allegedly the criminals behind the OPM breach, but experts want more evidence before trusting China. Continue Reading