Cyberattacks will occur. Preparation is the key -- and civilian agencies could take a cue from the military’s sustained readiness model.
Deception and half-truths are almost a given in many negotiations, Steve Kelman notes, but there are strategies that can maximize the other party's candor.
The cloud can often exceed the security of an on-premises or legacy data center. Here's why.