Blog Posts Tagged with "Marketing"


Spending Your 2012 IT Security Budget - Beware of Cheap

January 28, 2012 Added by:Rafal Los

If you can't be good, be cheap - the battle cry of the second-rate vendor. After spending 4 years as part of a world-class sales organization, I can tell you that with no uncertainty that I've seen some of my competitors do some absolutely insane things to compete...

Comments  (3)


Social Business Trends for 2012

January 26, 2012 Added by:Steven Fox, CISSP, QSA

The use of social media by merchants could be targeted by hacktivists with a social agenda or by hackers with financial goals. If hackers aligned themselves with protesters, they could launch social media campaigns designed to influence the perception of a business...

Comments  (0)


WOMMA Releases Social Media Marketing Privacy Guidelines

January 19, 2012 Added by:Headlines

WOMMA applauds the FTC's efforts at making transparency a key point. While it is not yet clear what effect these developments have had on the online marketing industry - we appreciate the agency's efforts to allow industry leaders to develop self-regulatory initiatives...

Comments  (0)


SecBiz -- Who will be Infosec's Pariah?

November 07, 2011 Added by:Ali-Reza Anghaie

Infosec has become overrun with FUD. We're on the verge of bottoming-out and reconstructing our collective industry souls. The next three years will be exciting times for our industry. And the first major breakthrough will be finding our pariahs...

Comments  (5)


The Benefits of FUD

July 06, 2011 Added by:Emmett Jorgensen

Fear, Uncertainty, and Doubt. Enemy of skeptic IT Pros, ally of marketers. Why do infosec pros talk about FUD in a negative light? Granted, some vendors push the FUD aspects of their marketing a bit too much. However, I think a little FUD can be a healthy thing. Let me explain...

Comments  (4)


Representative Introduces Consumer Privacy Protection Act

April 18, 2011 Added by:Headlines

The legislation will define limits and the fair use of information collected by online marketers and retailers, and set forth provisions for better notifying consumers of their right to opt out of data collection...

Comments  (0)


Information Security Conferences: Deadheading in 2011

April 13, 2011 Added by:Infosec Island Admin

To what end are these cons? Is it all about sharing information on hacks and tech? Is it all about partying and being wild? Is it some sense of counter culture that the community has latched on to in order to be different? I have news for you all - you are becoming one of two things...

Comments  (4)


What Ever Happened to Privacy on the Internet? Part 2

February 23, 2011 Added by:Rafal Los

It’s a matter of balance. And right now the marketers and business leaders who see value in using personal information are much louder and more actively pursuing their exploitation of personal information than those who are trying to ensure privacy is addressed...

Comments  (0)


The Emotional Content of Security

February 06, 2011 Added by:Danny Lieberman

At the beginning, there was the notion of “selling security with FUD“, starting with anti-virus and peaking in the early 90s with the outbreak of RPC worms on Wall Street. It was pretty easy to sell security with FUD tactics. Then we had 9/11...

Comments  (0)


Americans Waking Up to Social Media Privacy

January 07, 2011 Added by:Robert Siciliano

It is evident that without some type of government oversight that the “self policing” done by all those who stand to gain financially by selling our data will continue to spin out of control to the point where privacy will be something of the past...

Comments  (0)


Online Privacy: Fighting for Your Eyeballs

January 06, 2011 Added by:Robert Siciliano

Most major websites now install cookies on your computer, which track what you do online. Over time, these cookies develop a profile, which becomes your digital fingerprint, to a certain extent. Microsoft, Google, Facebook, and most major newspapers, retailers, and advertisers are in on the game...

Comments  (0)


How Do You Translate Information Security?

December 22, 2010 Added by:Allan Pratt, MBA

The bottom line is that we, as information security professionals, must speak with other business units in their own languages in order to explain the threats we deal with on a daily basis. Business units need to understand how their work can, and will, be affected when breaches happen...

Comments  (2)


E-Readers May Be Tracking More Than You Know

December 17, 2010 Added by:Headlines

The devices may also be transmitting information such as the speed at which a user reads material, which pages were accessed, and more importantly where the user was at the time they read the material via geo-location capabilities...

Comments  (1)


Deceptive Emails - This Time From SAP

December 08, 2010 Added by:Ben Rothke

I just received an email from VeriSign that shows they did remove all misleading language. But SAP seems not to have learned the same lesson. The subject line of ‘Get a $10 Gift card by completing IFRS Survey’ is clearly deceptive...

Comments  (0)


Software Disclosed Children's Info to Marketers

December 06, 2010 Added by:David Navetta

The FTC alleged that the company engaged in a deceptive act or practice in violation of Section 5 of the FTC Act by failing to inform parents that the information the software collected about their children would be disclosed to third parties for marketing purposes...

Comments  (0)


Privacy Mistakes for Social Media and Marketing

November 30, 2010 Added by:Rebecca Herold

Creativity can quickly evolve into dangerous unbridled enthusiasm whenever new technologies or information services are discovered, and then lead to bad decisions with regard to the use of their customers’ and other consumer information...

Comments  (0)

Page « < 1 - 2 - 3 - 4 > »