Jim Romeo

Send feedback to Jim Romeo



Recent articles for Jim Romeo

It's logical: Enterprise appsec investment 
Sep 4, 2013 | Comment Now 
Though ROI is difficult to quantify.
 
Social security risks 
Feb 6, 2012 | Comment Now 
Bigger and bolder action needed to fight fraud over social networks.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  70%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  10%
 
Denial of service attacks
  6%
 
Insider threats
  11%
TOTAL VOTES: 1147

Vote