Devious threats to information security naughty, not end of the world

In this week's SearchCIO.com Searchlight, threats to information security worth worrying over. Plus, is the end nigh for the 'big data' bubble?

As the so-called Mayan apocalypse arrives, we here at SearchCIO.com are firmly in the camp of Michael Stipe and Lenny Bruce. Besides, we have plenty of other things to worry about, such as last-minute Christmas shopping that will likely result in the feverish purchase of gift cards from a supermarket kiosk. Oh, that's just us? (Really? Remember, Santa is watching.)

Karen GoulartKaren Goulart

Well then, how about something we can all relate to fretting over -- threats to information security. This week's Searchlight shines a light on some unusual ways malware and viruses can weasel their way into your organization. If only these people could use their powers for good! (They'll be sorry. Remember, Santa is watching.)

But it's not all doom and gloom this week. We've also got the goods on how not to be a good leader, and ways to spread holiday joy from your smartphone. Pass the eggnog and enjoy!

Let us know what you think about the story; email Karen Goulart, Features Writer.

Dig deeper on Enterprise information security management

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

Related Discussions

Karen Goulart, Senior Features Writer asks:

Does your company have a good handle on threats to information security?

0  Responses So Far

Join the Discussion

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

SearchCompliance

SearchHealthIT

SearchCloudComputing

SearchMobileComputing

SearchDataCenter

Close