For some reason people assume that implementation methodologies are different according to the type of software and newer technologies such as enterprise social software are somehow unusual.
- The week in security: Revisiting security defences as breaches, BEC losses mount
- FBI: Email swindlers have now redirected as much as $12bn in payments
- What is single sign-on? How SSO improves security and the user experience
- What is a cyber kill chain?