There's always a risk that hackers will corrupt a data source with fraudulent data, noted David Wells, a principal consultant with Axis Technology "This is already being done with social media sites where hackers are selling things like fraudulent Facebook Likes and tweets," h...
Today, most enterprises have a number of network security appliances that provide protection against attacks aimed at enterprise computing resources, as well as prevent the loss of sensitive enterprise data due to deliberate or unintentional leakage. These security appliances work by matching network traffic with threat signatures or tracking application state as a means to detect suspicious behavior.
Social CRM
See all Social CRM