News

added: november 16, 2010

Computer Crime Needs Management and Education

A US university researcher has devised an antifraud strategy for business, indicating that reports of computer fraud only represent a tip of a potentially large iceberg.

Read more» Share article:
  • Facebook
  • LinkedIn
  • RSS
  • Twitter
added: november 16, 2010

Insider Threats Keeping IT Directors Awake At Night

The leaking of sensitive information through the email system was ranked far ahead of the threat from external hackers, according to a new study.c

Read more» Share article:
  • Facebook
  • LinkedIn
  • RSS
  • Twitter
added: november 16, 2010

Small Businesses Need Protection from Security Threats

I have always been concerned with small businesses being protected against modern threats. With the majority of my experience supporting small businesses, I have seen first-hand how devastating malware attacks can be. If a server goes down in a large company that has thousands of servers, it becomes a priority call to the Data Center

Read more» Share article:
  • Facebook
  • LinkedIn
  • RSS
  • Twitter
added: november 16, 2010

The Gray Lines Between Reconnaissance, Espionage and Cyberwar

There has been a lot of discussion about cyberwar and other threats to electronic infrastructure in the past few years, but there hasn’t been much basic definition of terms, especially terms that public decision makers and the general public can share. This is one attempt to provide some basic terms that can be meaningful to

Read more» Share article:
  • Facebook
  • LinkedIn
  • RSS
  • Twitter
added: november 16, 2010

The Psychology of Data Security

Over 6 years after the introduction of the first data loss prevention products, DLP technology has not mainstreamed into general acceptance like firewalls. The cultural phenomenon of companies getting hit by data breaches but not adopting technology countermeasures to mitigate the threat requires deeper investigation but today, I’d like to examine the psychology of data security

Read more» Share article:
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Panel's Jotter

Editor Intelink says:(2012-10-02 10:49:19)

“Een kwaliteitsslag voor school, student en stagebedrijf” Het herkennen en correct behandelen van bedrijfsvertrouwelijke informatie. Het programma speelt tevens doeltreffend in op de sterk toenemende behoefte aan Social Media Integriteit van stag...

On: Stagevoorbereiding voor MBO en HBO: Bewustwording Bedrijfsgeheimen & Social Media Integriteit
Danny Lieberman says:(2011-05-09 13:35:04)

As one of the pioneers in DLP - data loss prevention and an active thought leader in the field since 2003 - it is typical for people who discover that the emperor is naked to take knee jerk reactions. IT and HR procedures are part of a set of data...

On: WikiLeaks legt menselijke factor bloot (EN)
Rachel McShelley says:(2011-03-31 10:01:15)

Blijft helaas onduidelijk waarom BitDefender dit opvallend en vooral ook een beveiligingsrisico vindt.

On: Facebook: 42% onbekende online vrienden
View all replies»

Join us on:

  • Facebook
  • LinkedIn
  • RSS
  • Twitter


Panels

Join our Research Panel!
Sign up for: Study into Information Leakage in the Netherlands 2010


Publications

News and analyses on Human Factors & Awareness


Upcoming events

No events