The Wall Street Journal reports that the demise of multi-billion-dollar Nortel Networks was largely due to a few stolen passwords. Could the same thing happen to your company? Learn why information security technology can't prevent identity attacks – and learn what will prevent identity attacks.
Don't Get Norteled
464 pages
Copyright 2014
ISBN 978-1-931248-05-1
For centuries, every practicing physician was expected to know how much blood to drain from a patient at which stage of any ailment – until research demonstrated that bloodletting is useless and even harmful.
What does information security technology have in common with bloodletting? Download your free copy of Best Practices in the Use of Bloodletting and Information Security Technology.
The Authenticity Economy brings new jobs and new entrepreneurial opportunities. Learn how your background of integrity will open new doors for you. Quiet Enjoyment, Second Edition
457 pages
Copyright 2014
ISBN 978-1-931248-05-1
CIP TK5102.85.K87 2013
The principal money-making asset of the large search, digital media and social networking companies is the information that identifies your purchase habits, relationships, and political affiliations. In the digital age, information about you is the digital you. And so those big organizations consider you to be their property. Learn how the Authenticity Economy will deliver privacy for you and accountability from others – and will let you claim ownership of yourself.
357 pages
Copyright 2014
ISBN 978-1-931248-23-5
PKI Press
Copyright© 2014 by PKI Press