How to allow social media without getting ‘Koobfaced’

Federal CISOs face with the paradox of how to facilitate the use of Web 2.0 technologies amid increasing cyber-threat vectors. The current practice is largely based on “binary” decision-making — “allow-all” or “deny-all,” with the latter being the de facto standard. But there are practical approaches to achieving a risk-based middle-ground. (9 hours ago)

Tags: , , , , , , ,