Devious threats to information security naughty, not end of the world

In this week's SearchCIO.com Searchlight, threats to information security worth worrying over. Plus, is the end nigh for the 'big data' bubble?

As the so-called Mayan apocalypse arrives, we here at SearchCIO.com are firmly in the camp of Michael Stipe and...

Lenny Bruce. Besides, we have plenty of other things to worry about, such as last-minute Christmas shopping that will likely result in the feverish purchase of gift cards from a supermarket kiosk. Oh, that's just us? (Really? Remember, Santa is watching.)

Karen GoulartKaren Goulart

Well then, how about something we can all relate to fretting over -- threats to information security. This week's Searchlight shines a light on some unusual ways malware and viruses can weasel their way into your organization. If only these people could use their powers for good! (They'll be sorry. Remember, Santa is watching.)

But it's not all doom and gloom this week. We've also got the goods on how not to be a good leader, and ways to spread holiday joy from your smartphone. Pass the eggnog and enjoy!

Let us know what you think about the story; email Karen Goulart, Features Writer.

Dig Deeper on Enterprise information security management

PRO+

Content

Find more PRO+ content and other member only offers, here.

Join the conversation

1 comment

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

Does your company have a good handle on threats to information security?
Cancel

-ADS BY GOOGLE

SearchCompliance

SearchHealthIT

SearchCloudComputing

SearchMobileComputing

SearchDataCenter

Close