To continue reading, please log in.
If you do not have a username and password, please contact The McCalmon Group for subscription options.
|
To continue reading, please log in. If you do not have a username and password, please contact The McCalmon Group for subscription options. |
Data Compliance Audit: A Double-Edge Sword When Defending Data Security ClaimsA new report claims a surge in ransomware attacks. Compliance audits are necessary to limit risk, but there is a dark side to audits if organizations are not ready to comply. read more"Juice Jacking" Alert: FBI Warns Of Bad Public Charging PortsIn an unusual move, the FBI warns the general public to stay clear of public USB charging ports. We explain why "juice jacking" is a threat. read moreBiometric Authentication: Still Not Ready For Prime TimeA bank's choice to rely solely on biometric authentication was quickly shown to be a risk. We explain. read moreAsk Jack: Is Password Sharing The Same As Password Stealing?Stealing a password can be viewed as a crime, but what is wrong with sharing a password? Jack explains the problem. read more |
©2008-2024 The McCalmon Group, Inc. The McCalmon Group's User Agreement and Privacy Policy. |