Using Social Media to Block Cyberattackers
Despite its status as a threat magnet, federal IT professionals can actually use social media networks to thwart attackers.
Despite its status as a threat magnet, federal IT professionals can actually use social media networks to thwart attackers.
Despite their different points of view, IT operations and security depend largely on the same information in carrying out their jobs. Failure to recognize common goals and to take advantage of the common resources creates a sub-optimal situation for both IT operations and security.