Close

Search Results for: feed

A Product Roadmap in a Feed

Strategic Board was initially an idea about a new competitive intelligence/market intelligence tool for enterprises in the IT sector. Since then many things have changed including our concept and vision

United We Stand, Divided We Fall.

If I had to single out an individual development that elevated the sophistication of cybercrime by order of magnitude, it would be sharing. Codesharing, vulnerabilities sharing, knowledge sharing, stolen passwords,

Time to Re-think Vulnerabilities Disclosure

Public disclosure of vulnerabilities has always bothered me and I wasn’t able to put a finger on the reason until now. As a person who has been involved personally in

Taming The Security Weakest Link(s)

Overview The security level of a computerized system is as good as the security level of its weakest links. If one part is secure and tightened properly and other parts

The Emergence of Polymorphic Cyber Defense

Background Attackers are Stronger Now The cyber-world is witnessing a fast-paced digital arms race between attackers and security defense systems, and 2014 showed everyone that attackers have the upper hand

2010 The Decade of Content Discovery

The last decade, 2000-2009, flourished with new content creation tools: blogging, tweets, videos, personal pages/profiles, and many others. One thing that did not catch the speed of innovation on the

Machine Operated Web Applications

Software applications have two main perspectives the external perspective where interfaces to the external world are defined and consumed and the internal perspective where an internal structure enables and supports

didn't find what you are looking for?

Search again

Scroll Up