Security
Learn about information security: a management activity that is no longer optional for most large companies — it's the law. |
The maxims of security. Principle of Least Privilege » |
Security threats and security risk management. Get to Know the Threats Facing Your Business » The Difference Between a Security Risk, Vulnerability and Threat » The Big List of Information Security Threats » |
A list of information security strategies and techniques. Authentication vs Authorization » Canary Trap Explained » Honeypot Explained (Security) » |
Exploitable flaws and weaknesses. The 10 Root Causes Of Security Vulnerabilites » The Big List of Information Security Vulnerabilities » Security Through Obscurity » |
What is security trying to achieve? Web Security Cheat Sheet » Web Security Checklist » |
Conventional wisdom states that forcing users to pick complex passwords enhances security — but this is not always true. |
End Point Protection Platforms (EPP) are enterprise security platforms that protect PCs, mobile devices and server environments from malware, spyware, rootkits, trojans and worms. |
Recently on Simplicable
101 Game Design Principles for Social Mediaposted by Anna MarThe convergence of social media, software and gaming. |
Business Capability Mapposted by Anna MarThe most important diagram in all of business architecture — without it your EA efforts are in vain. |
101 Principles of Enterprise Architectureposted by Anna MarThis is the way to prove to your stakeholders that your recommendations are not just whims. |