Vint Cerf, Google's Chief Evangelist and the "Father of the Internet," joins his longtime friend Larry Smarr, himself one of the technology heroes of the age, onstage for a...
|
|
I believe that everyone needs to hear Sir Richard's thoughts and cautionary comments on the subject of the Chinese People's Liberation Army attacking commercial and...
|
|
Privacy regulations are about to become one of the great constraining forces on e-commerce, and one of the final legal bastions of personal protection for individuals,...
|
|
The role of the Chief Risk Officer is to directly assess and holistically manage all aspects of risk brought to bear on the enterprise by IT security and...
|
|
In most cases, using a phased implementation approach for Security Policy allows enterprises to begin to reap policy benefits quickly without causing the massive culture...
|
|
This video introduces the key driver of personal and unmanaged applications (PUAs) and the potential long term application portfolio strategy to integrate these into the...
|
|
It is suddenly that time of year again: time to review past predictions, rank them, and create a new set, in the hope that, by being reasonably accurate, they will assist...
|
|
About five years ago, Ray Ozzie, then newly anointed chief software architect at Microsoft, described the world he saw, from a security perspective, and the vision was...
|
|
We have now been warning members of the dangers of a cyber attack on their corporate Intellectual Property for several years. We think the current level of threat has...
|
|
In order to fully appreciate our concept of "Economic Cyberwar," one should start with the idea that the form of war preferred by mercantilist states is not militarist, but...
|
|