Security Executive Commentary
-
Leveraging Vendor Mergers and Acquisitions
2/13/2009
I like to break down vendor mergers and acquisitions into two categories: those that are “benevolent” and aim to develop a technology by purchasing it, and those that are “horizontal mergers” where a company removes market competition and gains market share through acquisition. In the latter...
-
The Rise of Cybercrime - Protecting the New Mobile Workplace
2/13/2009
The world has witnessed an unprecedented rise in global cybercrime. Criminal viruses and spyware are at record levels. Spam volumes are doubling every few months. Insider theft of confidential information has become a top concern. And, now with the advent of social networking such as Myspace, Flickr, Facebook, and...
-
How VARs Add Value In Protecting Computer Networks From Security Threats
2/13/2009
It's no secret that computer viruses, Web exploits, malware, and other Internet-based threats can wreak havoc on a company’s computers and network. Security problems not only threaten any business that buys and sells merchandise online, but any company that relies on a fully functional network for its day-to-day ...
This website uses cookies to ensure you get the best experience on our website. Learn more