I was first introduced to the limitations of ‘end user’ thinking a decade ago when I managed the rollout of an oil & gas exploration toolset. I expected clear processes and defined user roles. Instead ...
The recent OS X-specific Mac Trojan ignited many hot conversations on various security mailing lists last week. Supposedly, the excitement regarding the Trojan is that it is the first time ...