Curious about the US National Strategy for Trusted Identities in Cyberspace (NSTIC) and its private sector-lead partner the Identity Ecosystem Steering Group (IDESG)? Look…
The word “eBay” necessitates no introduction. It’s a household brand, and a very successful one at that. The company made $16 million in gross revenue in 2013, netting…
Cybersecurity Seminar: How to Protect Your Small Business John Bambenek, President, Bambenek Consulting Champaign EDC, March 25, 2014 About me 15 years experience in cyber…
FEDERAL CYBERSECURITY BEST PRACTICES STUDY: INFORMATION SECURITY CONTINUOUS MONITORING October 2011 Bruce Levinson Center for Regulatory Effectiveness 1601 Connecticut Avenue,…
2012 Technology Trends Tech Trends 2012 Elevate IT for digital business Preface Welcome to Deloitteâs annual report examining trends in technology put to practical business…
Microsoft Word - WhitePaper_Top Threats to Financial Service Providers in 2010_FINAL.docx Top Online Banking Threats to Financial Service Providers in 2010 2 Top Online Banking…
ActiveSync Bring Your Own Device Essentials with Windows Technology, Part 1 Raymond Comvalius & Sander Berkouwer SanderB, v1.2: Achtergrond toegevoegd SanderB, v1.2:…
Cloud Breach - Forensics Audit Planning The goal of this presentation is to assist IT Risk and Security professionals with adding Cloud computing forensics to their Incident…
COMPARATIVE FEATURE MATRIX | Citrix XenApp Citrix XenApp® Comparative Feature Matrix A list of features included in Citrix XenApp by product edition. Includes a comparison…
A Case Study of Eurograbber: How 36 Million Euros was Stolen via Malware December 2012 By Eran Kalige Head of Security Operation Center Versafe Darrell Burkey Director, IPS…