Operation "Aurora": A Revolution in the Threat Landscape

Blog post

Following this attack — each user has to be treated as an insider threat since cyber-criminals and government proxies can take control of legitimate user accounts by employing sophisticated phishing techniques and social engineering. This “Aurora” attack was not a direct breach of Google networks. They got access first by attacking an end-point — tricking a user into installing malware.

One Product Guy’s Ramble Through Document Exchange

Blog post

The sheer number of places where companies keep their critical information is truly astounding and I believe it is one of the biggest overarching problems in the realm of managing business information today. At the same Gartner Summit referenced above, research indicated that redundant and outdated information constitutes 50-90% of what we manage. So let me rephrase: We're swimming in a sea of old, redundant and often useless information.