IT Best Practices: Protecting the Perimeter
Podcast
Podcaster
Beschreibung
vor 11 Jahren
IT Best Practices: From the book “Managing Risk and Information Security: Protect to Enable” by Malcolm Harkins
At Intel, we are well aware of the risks associated with social media, but attempting to stop the use of external social media web sites would have been counterproductive and, in any case, impossible. We realized that if we [...]
At Intel, we are well aware of the risks associated with social media, but attempting to stop the use of external social media web sites would have been counterproductive and, in any case, impossible. We realized that if we [...]
Weitere Episoden
vor 7 Jahren
Kommentare (0)