Tag Archive for risks and issues

Using Project Management to Reduce Risk

Mark-Langley-240x300

As CFO, you’re charged with ensuring that your organization is positioned to deal effectively with all kinds of risks — operational, financial, reputational, and strategic. Assessing your organization’s risk profile through the prism of its portfolio of projects and programs can be a good place to start. Projects are how you implement your strategy; project…

The case against Google: Tie breaker

20160423_LDC000

TECH moguls look upon the European Commission with as much enthusiasm as does the average Tory MP from the English shires. Europe has no successful technology companies of its own, they whisper, which is why Eurocrats spend their time hassling American tech giants instead. Not for the first time Google finds itself in the commission’s…

Java installer flaw shows why you should clear your Downloads folder

img_1626-100640300-large

Older versions of the Java installer were vulnerable to binary planting in the Downloads folder On most computers, the default download folder quickly becomes a repository of old and unorganized files that were opened once and then forgotten about. A recently fixed flaw in the Java installer highlights why keeping this folder clean is important.…

4 essentials to creating a world-class threat intelligence program

Toward Digital Intelligence

Threat intelligence is vital to assessing your company’s risk. A former Secret Service agent reveals the requirements of a successful threat intelligence program. Businesses, large and small, are changing tactics when it comes to information security. Rather than spend hard-earned cash attempting to cover every base defensively, company officials are developing information security postures based…

Internet security: When back doors backfire

20160102_LDD002_0

Some spy agencies favour “back doors” in encryption software, but who will use them? WITHOUT encryption, internet traffic might as well be written on postcards. So governments, bankers and retailers encipher their messages, as do terrorists and criminals. For spy agencies, cracking methods of encryption is therefore a priority. Using computational brute force is costly…

Is Your LinkedIn Profile at Risk?

290_SocialMedRisk

The social media service is a target for cyber-crime, and cyber-threat groups have created an extensive network of fake but convincingly real LinkedIn profiles. The proliferation of malware and other cyber-threats is exceeded only the ingenuity of those perpetrating the crimes. Today, it seems as though no product, service or solution is safe. The latest…