The following appeared in the Canadian online magazine Security Matters: Location Based Services: Do you know where your data is? Do you know where your data is? By Christopher Burgess Everywhere you look, retailers and other entities are offering to collect your data using one of the many location-based services available to collate your whereabouts ...
Last updated byat .
In October, I had the pleasure of being the guest on Talk2Cisco and to discuss social media and cyber security. Here is the write-up and recap of the event: Talk2Cisco . I took a moment and watched the video, and thought, this is something beneficial to small, medium and large businesses. I also think the ...Tags: christopher burgess, Cisco, Cisco Security, Information Technology, Infosec, security, Social Engineering, social media, Social Network, Talk2CiscoInformation Security, Safety & Security
My 2010 speaking schedule took me to all corners of the world. I traveled to Hong Kong, where I was honored to be an industry plenary speaker at the Interpol/Hong Kong Customs Intellectual Property Crime conference, also visited Canada, Toronto specifically, where I spoke at the Ontario government’s town hall, and not far from home, I was pleased to be asked to ...Tags: Arkansas, Canada, Cisco, CSI, Global Threat, Hong Kong, Identity, Intellectual Property, Interpol, IT, Mons, NATO, Ontario, security, SMCSEA, social media, Speaker, TorontoPresentations
By Christopher Burgess Do you work for an enterprise or a small-to-medium-size business? If so, odds are you have an information technology department supporting you. If you work for yourself, you may leverage the knowledge of others in cobbling together an information technology infrastructure to support your daily work. I work for a conglomerate and ...Tags: Cisco, Cisco Security, Connected World Report, Consumerization, IT Policy, Security Thought Leadership, social media, Social Network, Technology NewsInformation Security, Safety & Security
By Christopher Burgess When you access your email each day, do you do so at a distance of 15 paces because you’re just not sure what might jump out of that inbox? You can just about anticipate an email detailing how another user has caused a “blip” that will stretch your capabilities to protect both ...Tags: christopher burgess, Cisco, Cisco Security, Connected World Report, Consumerization, IT Policy, security, Security Thought Leadership, social media, Social Network, Technology NewsInformation Security, News, Safety & Security