January 16, 2015
Our weekly video wrapup sounds the alarm on Verizon’s zombie cookies. We also share a CIO’s perspective on how technology shifts have disrupted IT budget assumptions. Plus we chart the rise of open source storage, and parse the difference between cyber-terrorism and vandalism in the CENTCOM Twitter hack.
You can find links to the full stories below. And don’t forget to answer our question of the week: Would you share secure login credentials with colleagues? Let us know in the comments section.
About the Author(s)
You May Also Like
Perspectives on Security for the Board - 3rd Edition
Q3 Threat Horizons Report
Edge Computing Bridges IT and OT People, Process, and Technology
The Definitive Guide to Understanding IP Addresses, VPNs and their Implications for Businesses
Top Six Recommendations to Improve User Productivity with a Hybrid Architecture