There were 2 blog postings during March (2014):
The perils of the privileged insider
Insiders may not be the source of the majority of threats organisations face, but any malicious activity, or even inadvertent mistakes that they make, can be among the most damaging—and especially those with elevated privileges to access...
Fran Howarth, Bloor Research | 17th March '14
A brave new (pretty scary) world
The need to build or rebuild trust, ideological shifts pointing towards cyber war, technology touching all parts of our lives, cultural shifts spawning cyber activism, digital natives and the democratisation of technology in favour of less developed...
Fran Howarth, Bloor Research | 24th March '14
Published by: electronicdawn Ltd.