Blog Posts Tagged with "Marketing"

Ad5130e786d13531cc0f2cde32dacd0f

Aren’t all Security Professionals Evangelists?

May 08, 2012 Added by:Andrew Weidenhamer

I often wonder is Evangelist the right title for some individuals. Considering that the main audience for a “Security Evangelist” is the security community, I’m not entirely sure how much conversion is actually happening as we all understand the importance of security...

Comments  (2)

4ff49873e3fed9a24adf0d37ae00b780

It's Summer Blockbuster Season Again - Time to get Prepared

May 08, 2012 Added by:Lee Munson

One of the most used tricks that black hat hackers use during this time of year is to piggyback off of the advertising of big budget movies. There are a lot of ways that you can leverage attacks with this type of advertising and believe me they use all of them...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Infosec Island Seeks Industry Partners for Security Conferences

May 07, 2012 Added by:Infosec Island Admin

Through a combination of custom content publication that features products and services, video interviews with company personnel onsite, and traditional banner ad campaigns, organizations can better leverage the impact of attendance and participation at key industry events...

Comments  (0)

B1c4090e84dcfac820a2b8ebe6eee82b

On the Underground Economy of Twitter Followers

May 06, 2012 Added by:Gianluca Stringhini

All Twitter Account Markets we analyzed offer both "free" and "premium" versions. While premium clients pay for their services, the free ones gain followers by giving away their Twitter credentials - a clever way of phishing - or by sending out "promoted" content, typically spam...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Unmasking Agility: Cloud Reality or Myth of Marketing Hype?

April 30, 2012 Added by:Rafal Los

Agility is the ability of the IT department to provide services that adapt to the changing needs of your organization faster than before, with on-premise servers, systems and staff. Increasing your business' agility means that IT has done something to contribute to a business...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Will Industry Agree to a Meaningful Do Not Track?

April 27, 2012 Added by:Electronic Frontier Foundation

A coalition of companies say they "only" want to track opted-out users for security purposes, market research, testing and improving their various advertising and tracking products, auditing, copyright enforcement and other "legal compliance" purposes, not other purposes...

Comments  (3)

7fef78c47060974e0b8392e305f0daf0

Fear and Loathing in Infosec: A Savage Journey

April 17, 2012 Added by:Infosec Island Admin

The players mime their passion plays to obtain the almighty dollar and make their daily bread. Grimy hands slither over every inch of the client while pouring soothing words, cooing in their ear about how their solutions will cure ills and make them more virile than the next guy...

Comments  (1)

296634767383f056e82787fcb3b94864

China: Our Incompetent Master Adversary?

April 16, 2012 Added by:Jeffrey Carr

Either China is the greatest and dumbest adversary we've ever had, or the real dummies are those in infosec who can't be bothered to question the obvious when doing incident response, or who choose to cater to the rising tide of Sinophobia in the U.S. in order to boost their sale...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

FTC to Link Do-Not-Track and Big Data Concerns

April 02, 2012 Added by:David Navetta

The FTC sees a greater threat to consumers in third-party data collection because of lack of notice, choice and transparency in the practices of data collectors. But the challenge is understanding where to draw the line between “first party” and “third party” practices...

Comments  (1)

03b2ceb73723f8b53cd533e4fba898ee

Reflections on the Zero-Day Exploits Market

March 26, 2012 Added by:Plagiarist Paganini

Once the vulnerability and exploit are found, the researcher must be able to in a short time identify the possible customers, then contact them for negotiating the price and completing the sale. There are concrete risks...

Comments  (0)

850c7a8a30fa40cf01a9db756b49155a

The Emperor's Advanced Persistent Clothing

March 12, 2012 Added by:J. Oquendo

When "experts" start believing their own hodge-podge of "truths", it spreads like a cancer and ends up in the ears of decision makers. When will security pros stop focusing on marketing in hopes of selling shares of the Brooklyn Bridge and focus on actually securing something?

Comments  (3)

7ddc1f3000a13e4dfec28074e9e7b658

Google Circumvents Browser Privacy - Why We Need Do Not Track

February 26, 2012 Added by:Electronic Frontier Foundation

One way that Google can prove itself as a good actor is by providing meaningful ways for users to limit what data is collected. It’s time Google's third-party web servers start respecting Do Not Track requests, and time for Google to offer a built-in Do Not Track option...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Abandon FUD, Scare Tactics and Marketing Hype

February 25, 2012 Added by:Rafal Los

Perhaps it is security professionals' diminished tolerance for FUD, or perhaps there is a collective awakening to the bigger picture, or it was just time for the chickens to come to roost. No matter, this drastic anti-FUD backlash is strong and I for one say it's about time...

Comments  (2)

65be44ae7088566069cc3bef454174a7

Is Information Online Legally Fair Game to Use for Marketing?

February 21, 2012 Added by:Rebecca Herold

Social media sites are booming. The amount of personal information posted to them, such as photos, videos, original stories, thoughts, gossip, is exploding. Marketers are drooling at the prospect of using all that “free” information. Well, it’s really not free, folks...

Comments  (0)

F29746c6cb299c1755e4087e6126a816

Google Wants to Get to Know You Better... Uh-Oh

February 19, 2012 Added by:Kelly Colgan

The company that started out as a little search engine has grown into a behemoth that dabbles in everything from social networking to picture sharing to 3D modeling. And it plans to integrate information pulled from all of those Google services you use to learn more about you...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Commercial DDoS Tools Offer a Competitive Advantage

February 13, 2012 Added by:Headlines

With the growing availability of DDoS services being marketed directly to businesses, enterprises may increasingly find themselves under attack from competitors seeking to gain an advantage in the increasingly lucrative Internet marketplace...

Comments  (0)

Page « < 1 - 2 - 3 - 4 > »