For some reason people assume that implementation methodologies are different according to the type of software and newer technologies such as enterprise social software are somehow unusual.
- Inside the thriving ransomware market
- Concerned about privacy, Australians embrace mandatory data-breach scheme
- Fake Telstra and EnergyAustralia email bills spread banking trojans
- Gone in 15 seconds: why faster bank transfers make Australia an even bigger target for email fraud
- Synchronized security is the right arsenal for modern CSOs: Sophos exec