Where Whistleblowing Fits into Business Continuity
On the face of it, business continuity is a robust process. You gather the appropriate information, apply methodologies to assess business risk.
On the face of it, business continuity is a robust process. You gather the appropriate information, apply methodologies to assess business risk.
Within the next five years, the number of people connected to the Internet is forecast to rise to over 7 billion. The number of things hooked up to the web is projected to be around 50 billion. While the Internet of Things (IoT) still has to fulfil certain promises, the base is already there. From…
If you haven’t yet met cross site scripting or XSS for short, it’s probably only a matter of time. And if your enterprise is running a web site that allows users to enter data, for example as search terms, consider XSS as a threat to be tackled now, not later. The short version of what…
With the security threats around today, the sheer mass of information and the vulnerabilities to attack, it has to be admitted that information security is a challenge.
When you’re scouring your neighbourhood to detect possible risks to your organisation, a tool like Google Earth can be a valuable asset. Without leaving your desk you can tour streets and advance street view by street view, pinpoint addresses such as the nearest phone service and electricity providers on your map and spot vulnerabilities –…