Search This Blog

Thursday, June 05, 2014

How do cyber criminals plan attacks?

New blue header
"How to steal $60 million in 60 seconds."
"Think like the bad guy," advises Frank Mong, when it comes to cyber security. How do cyber criminals plan attacks that realize returns like $60 million in a mere 60 seconds? Apply this new style of thinking with this HP Discover Session. Take a look.
CIO in the know 
We're bringing back 'Converged Infrastructure for Dummies 2.0' for this week's newsletter. If you haven't already, be sure to read it. Access now.

The new 'social' CIO

How did Twitter and two blogs make two CIOs 'better'? Enterprise CIO Forum community manager John Dodge explores. Read more.    

Tech news byte
Using Lego as a metaphor for cloud computing, Terence Ngai looks at why an open and modular approach to cloud is best. Take a look.
This email was sent to security.world@gmail.com by ecioforum@gmail.com |  
Instant removal with SafeUnsubscribe| Privacy Policy.
IDG Communications | 5 Speen St | Framingham | MA | 01701

No comments: