Thursday, January 16, 2014
Data Breaches Fuel Cyberinsurance Sales
http://smlrgroup.com/data-breaches-fuel-cyberinsurance-sales/
Facebook continues to improve their platform to lure ad dollars
http://www.nytimes.com/2014/01/16/business/smallbusiness/with-revamped-advertising-program-facebook-aims-to-compete-with-google.html?nl=todaysheadlines&emc=edit_th_20140116&_r=0
Wednesday, January 15, 2014
6 Ugly Truths You Need to Accept to Get Unstuck
http://www.oprah.com/spirit/How-to-Move-Forward-in-Life
Wednesday, January 8, 2014
Legal Non Sequiturs
http://abovethelaw.com/2013/12/non-sequiturs-12-31-13/
Sunday, January 5, 2014
Top 13 Cyber Security predictions for 2014
In 2014, threat intelligence gained within the enterprise network will offer new defence capabilities for mobile devices operating outside protected networks. Intelligence gained by mobile devices will offer new signature capabilities to further strengthen enterprise networks.
http://bit.ly/19IW2hWLegal Jobs Report: October (WSJ)
Legal jobs in October numbered 1,129,200 — more than 50,000 fewer than the 10-year high of 1,180,000 set in May 2007. The sector has added 4,100 jobs over the last 12 months.
http://on.wsj.com/1ftKFiePR and Social Media Measurement Conference
The top 5 takeaways from our PR and Social Media Measurement Summit , taking place in Washington D.C. February 18-19: Measurement + engagement = growth. You're already putting hours into establishing a connection between your customers and your brand; now learn measurement techniques that will make creating laser-focused content a breeze. You don't have to measure more, just measure smarter. Hear from experts about which measurement tools will work for you — and which tools aren't worth the hassle. The key influencers in your field are your best untapped resource. Find out how you can determine who those influencers are and measure how large their impact is on your customers.
http://bit.ly/JwJUKhUS consumer confidence rises on better job outlook
US consumer confidence jumped this month on a better outlook for hiring and growth, supporting other signs that show the economy could accelerate in 2014.
http://bit.ly/1bCa30xFriday, January 3, 2014
Custom Content Conference 2014
The Custom Content Conference is produced annually by the Custom Content Council. This event is geared toward content providers, marketing executives, media and vendors and focuses on the latest trends, content strategies, research, case studies and more.
http://bit.ly/1gw572FThe latest issue of Cybersecurity is out, check it.
"Cybersecurity is not an IT problem, it's a compliance solution" This is our operational mantra, our guiding principal. We use our expertise to guide our clients in crafting a defensible position for dealing with data and PII breach, cyberdefense, and compliance.
http://bit.ly/19OoDRFThursday, January 2, 2014
The Emergence of Enterprise Security Intelligence
Enterprise Security Intelligence (ESI) is defined as an emerging concept that is a comprehensive and holistic alternative to traditional disjointed security approaches that will enable stronger enterprise-wide security, optimal decision making and better business results.
http://slidesha.re/1ftJek2Cybersecurity Today is online, check it out.
"Cybersecurity is not an IT problem, it's a compliance solution" This is our operational mantra, our guiding principal. We use our expertise to guide our clients in crafting a defensible position for dealing with data and PII breach, cyberdefense, and compliance.
http://bit.ly/19OoDRFWednesday, January 1, 2014
Skype’s Twitter, Facebook, and blog hacked by Syrian Electronic Army demanding an end to spying
Today’s events is most likely linked to the US National Security Agency’s revealed surveillance programs that were uncovered by former contractor Edward Snowden. Many tech companies, including Skype’s parent company, Microsoft, have taken steps to refute claims that they have been cooperating with the government.
http://tnw.co/18YvuOuTarget Breach: PIN codes can access accounts via ATM's.
Target spokeswoman backtracked from previous statements and said criminals had made off with customers’ encrypted PIN information as well. But Target said the company stored the keys to decrypt its PIN data on separate systems from the ones that were hacked.
http://nyti.ms/1g9Te2cMedia Strategist
Blog Archive
-
▼
2014
(611)
-
▼
January
(14)
- Data Breaches Fuel Cyberinsurance Sales
- Facebook continues to improve their platform to lu...
- 6 Ugly Truths You Need to Accept to Get Unstuck
- Legal Non Sequiturs
- Top 13 Cyber Security predictions for 2014
- Legal Jobs Report: October (WSJ)
- PR and Social Media Measurement Conference
- US consumer confidence rises on better job outlook
- Custom Content Conference 2014
- The latest issue of Cybersecurity is out, check it.
- The Emergence of Enterprise Security Intelligence
- Cybersecurity Today is online, check it out.
- Skype’s Twitter, Facebook, and blog hacked by Syri...
- Target Breach: PIN codes can access accounts via ...
-
▼
January
(14)