Midsize Insider: Social and Mobile Platforms on the Rise at Midsize Firms
Practical Perspectives for the Midsize Business. Brought to you by IBM.See it on Scoop.it, via Information Security Education
View ArticleTED Weekends: The best TED talk videos and blog posts on Huffington Post
Explore this week's idea on #TEDWeekends on The Huffington Post and help it grow. Because ideas aren't set in stone. When exposed to thoughtful people, discussed and reacted to, they morph into an...
View ArticleOnline of fire: Bungling troops rapped for posting military secrets on social...
Material and information on operations, equipment and even the ultra-sensitive special forces and secret units was posted on Twitter, Flickr, YouTube, Facebook and LinkedInSee it on Scoop.it, via...
View ArticleProtecting Brand And Data While Staying Social -- Dark Reading
Despite worries about social media, most companies are not monitoring it for threatsSee it on Scoop.it, via Information Security Education
View ArticleGlobal market grows for fake clicks | The Portland Press Herald / Maine...
Companies are capitalizing on the chance to make millions of dollars by duping social media.See it on Scoop.it, via Information Security Education
View ArticleBanks Take Baby Steps Into Social Media
Banks are networking with consumers, but will they ever allow actual transactions?See it on Scoop.it, via Information Security Education
View ArticleSnapchat Hack a Wake-Up Call to Parents, Social Media | NewsFactor Network
This new year of 2014 may very well be the one in which the ability (or failure) of social networks to protect their users' data becomes a competitive advantage (or disadvantage).See it on Scoop.it,...
View ArticleENISA Threat Landscape 2013 - Overview of current and emerging cyber-threats...
ENISA releases the 2013's ENISA Threat Landscape (ETL 2013). The ENISA Threat Landscape is a collection of top cyber-threats that have been assessed in the reporting period, ie. end 2012-end 2013.See...
View Article2013 Data Breach Investigations Report
Download the 2013 #DBIR from Verizon for the latest on data security threats.See it on Scoop.it, via Information Security Education
View ArticleHow to protect yourself from security breaches on social media sites
All too often we see headlines warning users of security breaches to social networking sites. Here's how to protect yourself from security breaches on social media.See it on Scoop.it, via Information...
View ArticleOver 2 million stolen Facebook, LinkedIn and Google passwords leaked online
Over two million stolen user passwords for social media sites including Facebook, LinkedIn and Google have been leaked online, according to a report by security firm Trustwave.See it on Scoop.it, via...
View ArticleCyber security – the threats you need to watch out for in 2014 - Macworld...
Macworld Australia is the premier Australian source for news, reviews, help, how-tos, and expert opinion for the Australian Apple market, including the Mac, iPhone, iPad, and iPod.See it on Scoop.it,...
View ArticleQuickMobile Predictions: Event Apps and Social Media in 2014 | International...
In 2014, mobile event apps will embrace social networking by offering what is needed, not what is trendy.See it on Scoop.it, via Information Security Education
View ArticleSocial media policy legitimate for protection of employer interests -...
27 Jan 2014 - Australia - Employment and HR - Social media policy legitimate for protection of employer interests - Clayton Utz - Workplace policies and procedures have been widely adopted to...
View ArticleEnterprise Social Networks: A Guided Tour - InformationWeek
More enterprises are deploying internal social networks to encourage collaboration and improve productivity. Take a tour of the major platforms and see how they are being used by leading...
View ArticleSnapchat’s Security Problems Won’t Go Away - CBS Philly
Snapchat's latest securitySee it on Scoop.it, via Information Security Education
View ArticleSyrian Electronic Army Attacks CNN Social Media | Top Tech News
See it on Scoop.it, via Information Security Education
View ArticleIndian Army Asks Its Staff Not To Use Social Media Citing National Security
Indian Army, which is itself an active entity on social media wants its staff to stay away from social media. According to news reports, fearing that national security could be compromised; the...
View ArticleCybersecurity Predictions for 2014
Key information security trends to be on the lookout for in 2014 include new types of attacks, an increased mobile security threat and greater government pressure for standards compliance, according...
View ArticleTop IT job skills for 2014: Big data, mobile, cloud, security
The IT job market is on the rise, and top jobs include anything in big data, mobile, cloud or security. Learn more about the latest hiring trends with TechRepublic's roundtable of IT executives and...
View Article(ISC)²® Opens Call for Speakers for Second Annual CyberSecureGov Conference
Clearwater, FL (PRWEB) February 04, 2014 (ISC)2® (“ISC-squared”), the largest not-for-profit membership body of certified information and software security professionals with nearly 100,000 members...
View ArticleFacebook 10th Anniversary: Social Media Security Infographic
Cedar Rapids, IA (PRWEB) February 04, 2014 Post it, Tag it, Share it Like it or not; with over 1.2 billion active users, Facebook has become arguably the most influential element of our societys...
View ArticleNew Snapchat Hack Found by Researcher, So Snapchat Bans Researcher's Account
In recent months, young social media service, Snapchat, has been at the center of security scandals. Jaime Sanchez, a Spanish cyber security consultant for Telefónica, has just uncovered a new cyber...
View ArticleSocialMediaSecurity_infographic.jpg (816×8640)
See it on Scoop.it, via Information Security Education
View ArticleGovernment agency compromised by fake Facebook hottie | ZDNet
Emily Williams wasn't real, but the two hackers who created her from social media profiles got her a government job, a company laptop, VPN credentials - and compromised a government network.See it on...
View ArticleCIO Responsibility for Social Media
While it might be tempting to kick responsibility for social media regulatory issues over to risk management, Guest Contributors Richard Raysman and Francesca argue that the CIO is best placed to take...
View ArticleSOCIAL MEDIA: Is public WiFi safe?
Hot spots at coffee shops and other public areas simply are not secure from hackers looking for private dataSee it on Scoop.it, via Information Security Education
View ArticleBudget Bill Boosts Cybersecurity Spending - InformationWeek
Congress's $1.1 trillion spending package increases cybersecurity funding, but seeks more transparency in IT spending.See it on Scoop.it, via Information Security Education
View ArticleOAuth weakness threatens users of social media sites
Depending on their OAuth implementation, social media sites, such as Google, LinkedIn and Yahoo, could share users' personal information with malicious third-party websites, experts say.See it on...
View ArticleSocial Media in the Middle East: The Story of 2013
These slides, curated and analysed by ictQATAR's Damian Radcliffe and Shahd Dauleh, look back at the key developments and data points in the Middle East's so...See it on Scoop.it, via Information...
View Article