Write out LOUD!

Writing. This is a word that is most often heard in the classroom setting. However, writing is a word that should be associated with much more than essays, research papers and tests. Instead of viewing writing as an assignment, or “punishment,” we should view writing as a tool of liberation….

read more

How to write an effective enterprise mobile device security policy

Expert Lisa Phifer explains the process for creating a winning enterprise mobile device security policy that reduces the risk of mobile data threats. <img alt="How to write an effective enterprise mobile device security policy, Blog, Security, write., Enterprise, Mobile, policy, device, effective"height="0" width="0" border="0" style="display:none" src="http://segment-pixel.invitemedia.com/pixel?code=TechBiz &partnerID=167&key=segment”/> View full post…

read more

LIGATT: The answer is D. Software Vendors (The reason is security baselines are often established by software vendors for the software they write.)

LIGATT: The answer is D. Software Vendors (The reason is security baselines are often established by software vendors for the software they write.) View full post on Twitter / LIGATT Gregory Evans | LinkedIn Interview With Gregory Evans Gregory Evans Security Expert Gregory Evans on Cyber Crime

read more