Reprinted by permission of John Wiley & Sons. Excerpt from The Strategy Gap: Leveraging Technology to Execute Winning Strategies. Copyright 2003 by Michael Coveney, Dennis Ganster, Brian Hartlen, Dave King.
- CSO Roadshow 2018: How do we build a secure IoT?
- Outlook.com and Hotmail block all state govt email after hijacked account sends 8 million spam messages
- VirusTotal lets devs check whether a legit app will wrongly be flagged as malware
- The Humble Cybersecurity Bundle offers everything you need to protect your PC for $15
- Olympic Destroyer destructive malware targets EU bio-weapons research groups