HOME  |  BLOGS  |  MESSAGE BOARDS  |  AUDIO  |  VIDEO  |  WEBCASTS  |  RESOURCES  |  ABOUT US
Keith Dawson

The CIO Must Evolve

NO RATINGS
View Comments: Newest First | Oldest First | Threaded View
Page 1 / 3   >   >>
nindubhoomi
User Rank
Business Processor
Re: Hair-pulling
nindubhoomi   8/22/2015 11:58:37 AM
NO RATINGS
loll

maheshgupta
User Rank
Business Processor
Re: Hair-pulling
maheshgupta   8/14/2015 4:18:41 AM
NO RATINGS
good post 

anirudh singh
User Rank
Business Processor
Re: Hair-pulling
anirudh singh   7/8/2015 4:26:26 AM
NO RATINGS
I also suspect that perhaps the companies that have outsource IT most agressively might find it much more difficult to change the nature of their IT organizations

anil
User Rank
Business Processor
Re: Hair-pulling
anil   6/30/2015 7:49:24 AM
NO RATINGS
I asked myself the same question. From a personal point of view, stealing my linkedin password was wasted effort

salimhussain
User Rank
Business Processor
Re: Hair-pulling
salimhussain   6/30/2015 7:19:41 AM
NO RATINGS
good post

Nithin Reddy
User Rank
Business Processor
Re: Hair-pulling
Nithin Reddy   6/9/2015 6:28:11 AM
NO RATINGS
nice article

ramesh123
User Rank
Business Processor
Re: Hair-pulling
ramesh123   6/8/2015 3:06:10 AM
NO RATINGS
nice post

mohankrishna
User Rank
Business Processor
Re: Hair-pulling
mohankrishna   6/3/2015 8:57:40 AM
NO RATINGS
yeah great post

saipraneeth
User Rank
Business Processor
Re: Hair-pulling
saipraneeth   4/17/2015 8:20:03 AM
NO RATINGS
really nice post

vrs400
User Rank
Agile Expert
Re: Hair-pulling
vrs400   6/30/2012 3:21:08 PM
NO RATINGS
Yup! LinkedIn offers a premium service and allows customers to store their credit card details for rebilling purposes. I suppose with LinkedIn Premium, if a hacker broken in, he or she could figure out other details of your leads and contacts and steal them away. But even then, why not just focus attention on larger organizations with more pay off?

Page 1 / 3   >   >>
More Blogs from Keith Dawson
Researchers have discovered a new service offering -- criminals customizing cyberattack tools and hosting in a MaaS package.
Apple recently acknowledged (sort of) that Macs are not immune to malware. Here's why it's past time to run AV on Macs.
The social network will let users choose not to be featured in advertising, pay $20 million, and forego at least $103 million in revenue.
Research undertaken for the UK Ministry of Defence concludes that we spend too much on defensive technology and not enough on police work.
Business Agility Twitter Feed
HOME  |  BLOGS  |  MESSAGE BOARDS  |  AUDIO  |  VIDEO  |  EXECUTIVE FORUMS  |  WEBCASTS  |  RESOURCES  |  ABOUT US