Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Reading LevelReading Level
-
Content TypeContent Type
-
YearFrom:-To:
-
More FiltersMore FiltersItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceTarget AudienceLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
30
result(s) for
"Pendergast, Tom"
Sort by:
The impossible : one family's incredible true story
by
Sánchez, Sergio G. screenwriter
,
Belón, María screenwriter
,
Bayona, J. A. (Juan Antonio) film director
in
Natural disasters Drama
,
Families Drama
2013
Based on a true story of a family caught, with tens of thousands of strangers, in the mayhem of one of the worst natural catastrophes of our time. But the true-life terror is tempered by the unexpected displays of compassion, courage, and simple kindness that Maria and her family encounter during the darkest hours of their lives.
What Pepsi's failed ad can teach us about data privacy
2017
Because Pepsi's failed attempt to promote itself may have some lessons for those anxious to keep their company from experiencing a similar calamity when it comes to the release of personal data. There are a lot of well-meaning people in a wide range of businesses who might find themselves in a similar position with respect to the way they handle personal information gathered from consumers, customers or even employees.
Trade Publication Article
We're all responsible for combating fake news
2017
[...]we've seen people addressing their own professional communities with advice and tips on how they can resist the spread of fakery in their own domain, whether it's librarians (International Federation of Library Associations and Institutions), tech leaders (Steve King) or even marketers (Nicola Brown). Fake news and the InfoSec connection Those of us in the information security community continue to do our part--from the coders who create algorithms to identify and flag fake news, to the white-hat hackers who penetrate networks to help strengthen them, to the engineers who train machines to identify anomalous network behavior so it can be isolated and examined.
Trade Publication Article
How to avoid falling for the W-2 phishing scam
2017
[...]you'll have to set up similarly realistic and irresistible simulated phishing temptations for your other employees--perhaps purchase orders for the sales team or urgent customer requests for your customer service reps. About Steve Williams: Steve is the Director of Strategic Partnerships at MediaPro and has spent the past four years helping companies develop, launch and enhance their security awareness and data privacy programs.
Trade Publication Article
Reaching the cybersecurity tipping point
by
Pendergast, Tom
in
Privacy
2017
[...]you already know that the hard part is figuring out how. + Also on Network World: Security fatigue--or how I learned to overcome laziness and use a password manager + It'd be great if we could schedule the tipping point for our employees. In his book The Tipping Point, Malcolm Gladwell explained just how complicated it is to figure out how ideas or social movements reach a tipping point--let alone to figure out how to engineer a tipping point in the behavior of employees in your organization. Case in point: last month's celebration of Data Privacy Day, when a couple people in my company hit their cybersecurity tipping point. Here's how it went down: I arrived at work early and planted a file folder with (bogus) personal information in an upstairs conference room and a USB drive containing the same bogus data in the downstairs print room.
Trade Publication Article
Security fatigue--or how I learned to overcome laziness and use a password manager
2017
[...]if you've sent a business document to your private email so you can keep working on it at home, you've definitely got it. + Also on Network World: The CSO password management survival guide + You're not alone. Prepare your spouse (optional) If you are in a relationship where you share access to financial information or any form of password-protected information, recognize at the outset that choosing to use a password manager is a major relationship decision, like having children or inviting your mother to live with you. [...]get ready to beg for forgiveness. Because even if you tell them all of the above, the process of fixing all your passwords and developing new habits is going to be painful.
Trade Publication Article
The silver lining on a ransomware attack
2016
The malware--it turned out to be a form of ransomware called \"Zepto\"--had been contained to a single computer (more on this soon) and the Sales drive. Since all systems had been backed up in the wee hours of that morning, it was simple to recover the systems, run a full network scan, and get everyone back to work. In an all-hands meeting later that day, the company CISO shared the dramatic story of how they managed to avoid a catastrophic infection thanks to employees who reported their concerns and an IT team that had prepared properly and acted quickly in the face of the attack.
Trade Publication Article
Using 'Privacy by Design' Principles to Create a Risk-Aware Culture
2015
Professionals working in privacy or security find their domains coming closer and closer together. Industry associations and their respective conferences -- once focused solely on their own interests (for example, RSA for Security and IAPP for Privacy) -- are now thoroughly interdisciplinary. Surely one of the drivers of this convergence is the Privacy by Design movement, which started in the 1990s and has since taken root in both the privacy and security communities. Privacy by Design is identified as a distinct school of thought with clear organizing principles, while parallel \"security by design\" variants have evolved for designing security into applications. This convergence needs to go even further. While there is emerging consensus that both privacy and security should be \"designed in\" to new products, technologies and services, you won't truly mitigate the risks until you weave privacy and security concerns together into the very fabric of the organizational cultures.
Trade Publication Article
\Horatio Alger Doesn't Work Here Any More\: Masculinity and American Magazines, 1919-1940
1997
Through the early 1920s, the \"American Magazine\" dealt with issues of concern to American men. However, by the mid-1930s, it was catering mainly to women.
Journal Article