Similar Articles |
|
AskMen.com Mr. Mafioso |
How To Make Threats The principles of negotiating with threats can be widely applied, even to business situations. |
InternetNews September 6, 2005 Jim Wagner |
IMlogic Tackles Zero-Day Chat Threats The Real Time Threat Protection System attempts to block fledgling worms and viruses before they become a problem for network administrators. |
HBS Working Knowledge January 26, 2004 Deborah M. Kolb |
Keeping Your Cool in Negotiations Tips for deflecting the other side's power grab. |
HBS Working Knowledge September 6, 2004 Don A. Moore |
Use Deadlines for Powerful Negotiations You can use deadlines to your strategic advantage in negotiations--but so can your opponent. Here's how to make the most of time pressure. |
PC Magazine August 17, 2005 Ryan Naraine |
The Lookout: Ducking Spyware More that 90% of Internet users in the United States have altered their online behavior significantly to counter the threat of spyware programs, according to a study. |
T.H.E. Journal February 2005 Patrick Hinojosa |
Information Security: Where We've Been and Where We Need to Go Proactive technologies that can protect against new, unknown threats without human intervention must be deployed to ensure the integrity of IT systems. |
HBS Working Knowledge April 5, 2004 Deepak Malhotra |
Six Ways to Build Trust in Negotiations All negotiations involve risk. That's why establishing trust at the bargaining table is crucial. The author presents strategies to build trustworthiness. |
Insurance & Technology November 5, 2008 Peggy Bresnick Kendler |
Virtual Roundtable: Online Risk Industry experts discuss how to manage the risks, liabilities, and solutions associated with electronic processes and interactions related to conducting business over the Internet. |
National Defense July 2014 Stew Magnuson |
Funding Not Following Concerns About Insider Threats Spies, disgruntled workers and intellectual property thieves have always been a problem in both government and private sector organizations. |
InternetNews June 16, 2005 Tim Gray |
Browser-Based Attacks on the Rise Browser-based attacks such as pharming and phishing scams are now the fastest-growing security threat on the Internet. |
Inc. August 2003 Rob Walker |
Take It Or Leave It: The Only Guide to Negotiating You Will Ever Need If you want to be a better negotiator, you can buy 24 books, take 12 courses, and attend 7 seminars -- or, you can read this article . |
InternetNews July 28, 2010 |
Cisco Warns on Enterprise Security Threats In its latest quarterly Global Threat Report, networking giant Cisco outlines a broad-ranging list of threats to enterprise security culled from its various security products. |
HBS Working Knowledge February 14, 2005 Lawrence Susskind |
Striking a Deal with a Difficult Negotiator One of the trickiest aspects of negotiation is figuring out how to deal with an individual who cannot be convinced by the merits of evidence or arguments. The article uses a sales call as an example. |
AskMen.com September 2, 2005 Mr. Mafioso |
11 Negotiation Strategies Negotiation, real negotiation, involves more than saving a few bucks. Done properly, both parties come out happy. Here is a refresher course. |
InternetNews April 6, 2005 Sean Michael Kerner |
Report: IM Threats All The Rage The first-quarter report by the IMlogic Threat Center says attack increase will likely continue. |
HBS Working Knowledge May 29, 2006 Lawrence Susskind |
Why Technology Negotiations Are Different You can anticipate four specific problems to crop up more often in technology negotiations. |
HBS Working Knowledge October 3, 2007 Malhotra & Bazerman |
Dealing with the 'Irrational' Negotiator The Harvard professors' new book, Negotiation Genius, combines expertise in psychology with practical examples to show how anyone can improve dealmaking skills. In this excerpt, they describe what to do when the other party's behavior does not make sense. |
Search Engine Watch March 14, 2006 Greg Jarboe |
Winning a Search Advertising Bid War Your pay-per-click campaign is advancing steadily until suddenly, another company launches a surprise attack, overruns your position, and pins you down in a bloody bidding war. What do you do? Pull back? Hunker down? Or counter-attack? |
Information Today May 5, 2015 |
Cisco Integrates Solutions for Threat Protection Cisco integrated its Cisco Application-Centric Infrastructure data center solution with its FirePOWER Next Generation Intrusion Prevention System to provide automated threat protection for combating emerging data center security threats. |
National Defense November 2013 Stew Magnuson |
Companies Ill-Prepared to Fend Off Insider Threats Two high-profile cases are putting a spotlight on insider threats in the private sector, particularly companies that do business with the Defense Department, intelligence agencies and other government organizations. |
InternetNews August 4, 2005 Tim Gray |
IM Threats Bombard Systems The increase in attacks on instant messaging systems has corporations on guard. |
National Defense February 2015 Sarah Sicard |
Experts: Thwarting Insider Threats Takes A Holistic Approach Insider threats, whether they are foreign spies, disgruntled employees or embezzlers, can't be stopped with software alone, experts at a cyber security summit recently warned. |
AboutSafety May 4, 2001 |
Developing And Implementing A Workplace Violence Prevention Program And Policy The first priority in developing violence prevention policy is to establish a system for documenting violent incidents in the workplace... |
D-Lib Sep/Oct 2012 Vermaaten et al. |
Identifying Threats to Successful Digital Preservation: the SPOT Model for Risk Assessment Digital preservation strategies, as well as the processes and tools that implement those strategies, are designed to secure the long-term future of digital materials. A successful digital preservation strategy must account for and mitigate the impact of various threats. |
HBS Working Knowledge August 9, 2004 Adam D. Galinsky |
When to Make the First Offer in Negotiations Substantial psychological research suggests that, more often than not, negotiators who make first offers come out ahead. |
Entrepreneur June 2008 Robert Kiyosaki |
Stand Tall The fear of fighting is much worse than the actual fight, so don't be afraid to go after goliath. |
InternetNews April 26, 2005 Tim Gray |
SurfControl Tackles Spyware The company will join the growing number of software companies offering network-based tools for fighting spyware. |
InternetNews June 7, 2004 Jeremy Jarrell |
ArcSight Counters Threats Unseen Current Subscriber Identity Module (SIM) technology provides protection against existing threats, but how do you combat something that isn't there? |
The Motley Fool September 1, 2011 Dan Radovsky |
A Game of Patents: Acquire or Die Tech companies fight tooth and nail for protection against patent litigation. |
Bank Technology News November 2007 |
McAfee's Top 10 Threats for 2008 McAfee released its 2008 threat predictions this week. Here's the first half of the list. |
InternetNews April 5, 2010 |
Security Experts: 'Malware Like a Sniper' A panel of security experts had some grim news on the state of security. How does IT prepare for what's coming? |
PHONE+ February 3, 2010 Jean Kelley |
Enhance Your Professional Credibility In order for others to view you as credible, you have to consistently and deliberately act your way into credibility. |
Searcher June 2001 Seymour Satin |
Negotiating: From First Contact to Final Contract The information professional's job description changes so rapidly from day to day, it's hard to keep up. From researcher to Web designer to information guru, the latest skill set all information professionals need is how to negotiate... |
InternetNews April 9, 2008 Stuart J. Johnston |
Microsoft's Security Bundle Goes Beta A public beta test starts for Microsoft's 'Stirling' security products. |
IndustryWeek November 1, 2008 Nick Zubko |
Powers of Persuasion Successful negotiators each have their own unique approach, but they also have a few things in common. |