Luisa Gentile

34 Flips | 1 Magazine | @Luisa6gou | Keep up with Luisa Gentile on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Luisa Gentile”

Six keys to leading positive change: Rosabeth Moss Kanter at TEDxBeaconStreet

Which of your favourite websites are terrible at passwords?

Match.com, you might be one of the biggest dating sites out there, but you’re breaking our hearts.<p>The site came in dead last in the latest password …

Security Awareness Special Interest Group: Zoe Hands, Network Rail

Alarmingly Low Rate of Employees Receive Security Awareness Training

With the state of the economy, it is not too shocking that only 43% of employees receive security awareness training. Many companies have been faced …

Unified Endpoint Management (UEM) | IBM

Why IBM MaaS360 with Watson<p>With Watson insights<p>Valuable actionable intelligence and cognitive analytics<p>Complete cloud UEM<p>Fast deployment and …

What's wrong with this picture? The NEW clean desk test

Can you spot the 10 security mistakes?<p>What do you notice about this workspace?<p>Most desks hold sensitive documents and information that you don't want …

Two-factor authentication: A good first step after Heartbleed

Yes, you should switch your passwords for services affected by the Heartbleed security vulnerability. But you can do better than that.<p>Some of today’s most popular web services let users enable a two-step, or two-factor, sign-on process that can apply an additional layer of authentication by asking …

Empowering Women in Information Security | The State of Security

Daniel Humphries, IT Security Managing Editor for Software Advice wrote:<p><i>A 2013 study by InformationWeek reports that the median salary for IT</i> …

Three Effective Approaches To Corporate Security

The IT security threats lurking out in the world are greater, more varied, and far more insidious than ever before — and high-profile incidents of hacking have become routine news.<p>“The greatest challenge in securing complex systems is that they are just that – complex,” said Oren Hamami, Director …

Stanford’s password policy shuns one-size-fits-all security

University relaxes hated character complexity as password length increases.<p>Stanford University network engineers have unveiled a refreshingly …

Employees (And Their Gadgets) Pose Security Risk to Workplace

New report shows a rise in the number of secure mobile apps, as IT managers fortify corporate networks.<p>As scary as hackers are, they may not be the biggest security threat weighing on corporate information technology executives.<p>Rather, it’s the growing number of employees who bring their …

Microsoft cybersecurity report: 70 percent decline in severe security vulnerabilities, but criminals aren’t giving up

Microsoft’s latest cybersecurity report, released Wednesday, shows a 70 percent decline in the number of severe vulnerabilities that were exploited …

Leading Change: Why Transformation Efforts Fail

Leading Change: Why Transformation Efforts Fail<br>BY JOHN P. KOTTER<br>Comments (9) January 2007<br>Editor’s Note: Guiding change may be the ultimate test of a leader—no business survives over the long term if it can’t reinvent itself. But, human nature being what it is, fundamental change is often resisted mightily by the people it most affects: those in the trenches of the business. Thus, leading change is both absolutely essential and incredibly difficult.<p>Perhaps nobody understands the anatomy of …

Disrupting Behavior: 4 Companies Boosting Business By Changing Behaviors

4 min read<p>Some of the most disruptive startups didn’t just change an industry – they changed how we live. There’s a wave of new companies who hope to change peoples’ habits and become the next Uber, Facebook or Airbnb.<p><b>Company:</b> Cover - www.paywithcover.com<b><br>Co-founders:</b> Andrew Cove and Mark</b> …

U.S. Dept. of Defense

Heartbleed Bug Update

Inside Flipboard / April 9, 2014<p>As soon as we found out about the Heartbleed bug, the team here began working on understanding its implications for …

The Week in Review: Heartbleed Strikes

Inside Flipboard / April 12, 2014<p>Last Monday, news broke that sensitive user information stored by most major websites was vulnerable to hackers–and …

Coaching Others: How a Mantra Helped Me Evolve

A mantra was the inflection point for realising my effectiveness and becoming a sought-after coach.<p>I am a local guide of sorts with inside …

Heartbeats to replace traditional passwords

Our heartbeats could be used instead of traditional passwords to unlock smartphones, tablets and cars using a new device being developed by Canadian company Bionym.<p>Passwords scrawled on a scrap of paper are easily lost, jumbled letters and numbers are quickly forgotten and, with “password” still …

First travel app to North Korea offers guide to secretive country

It may be one of the world's most restrictive destinations – largely off limits to foreign journalists and impossible to visit without a government endorsed tour guide – but one startup is hoping to shed new light on North Korea with the launch of a travel app to help users plan a visit to the …

Android malware holds phones to ransom for 'viewing illegal porn'

<img src="http://cdni.wired.co.uk/138x138/a_c/ars.png" alt="Ars Technica" style="float: left;"/>Researchers have uncovered Android-based malware that …

Facebook defends new privacy policy on its activity tracker Moves

Facebook has clarified alterations to the privacy policy of its newly acquired activity tracker, Moves, explaining the difference between "sharing" and "commingling" of data.<p>A Facebook spokesman told the Guardian that the reason the terms and conditions were updated to allow the app to share data …

Minecraft: Denmark replica disrupted by 'cyber vandals'

<b>A virtual replica of Denmark created to help educate children has been disrupted by "cyber vandals".</b><p>Small portions of it were blown up, despite a ban by its creators, the Danish Geodata Agency (DGA), on the use of "dynamite".<p>Large US flags were erected at the starting area, as well as red, white …

10 talking points about cybersecurity and your business

It’s the large-scale cybersecurity breaches that make the headlines: Target, Adobe, Sony and the recent concerns about the Heartbleed bug being obvious examples.<p>Yet businesses of every size are grappling with how to secure their networks, devices and data. A roundtable this week in London organised …

Watch Dogs is a wake-up call on internet security

Most of the time, game protagonists occupy worlds that are utterly fantastical, bearing little resemblance to our own reality. From the space marines of Halo to the artifact-grabbing archeologists of Tomb Raider and Uncharted, our exploits in games are as relatable as blockbuster popcorn cinema. It …

Today Is World Password Day, So It's Time to Change Some Settings

This article is from the archive of our partner .<p>Wednesday is World Password Day, a holiday/public service announcement created to remind millions of …

Lose your phone at a restaurant? Someone probably stole it, report finds

Phone theft — it’s an epidemic. So much so, that mobile security company Lookout teamed up with IDG Research and conducted a survey of smartphone owners in the U.S., U.K., France, and Germany that has yielded a sort of “state of affairs” of smartphone theft.<p>Here are a few numbers about smartphone …

What's a Bigger Threat: Terrorism or Climate Change? | The Takeaway | WNYC

At what point does climate change become a national security issue? One retired general explains why global climate change is not just an …