Comments on Cyberwar Between Business Competitors – This blog’s prediction come true?Closing divides, directing purpose, and achieving results.2013-05-01T05:51:14Zhttp://itknowledgeexchange.techtarget.com/business-technology/cyberwar-between-business-competitors-this-blogs-prediction-come-true/feed/atom/By: FlimFlamFlimFlamhttp://itknowledgeexchange.techtarget.com/business-technology/?p=1607#comment-3612013-02-20T15:44:07Z2013-02-20T15:44:07ZGreat post, as always! I wonder if hacks by gevernment entitites, like the Chinese military hacks against U.S. corporations would fall into your Competitor-Hack framework, or is that a whole different area, more cyber-espionage than malicious hacking?
]]>By: Seabreezes1Seabreezes1http://itknowledgeexchange.techtarget.com/business-technology/?p=1607#comment-3602013-02-19T17:43:09Z2013-02-19T17:43:09Z“In the realm of risk, unmanaged possibilities become probabilities.” That should be codified as a “law.” We’ve all seen it, bad decision making that deals with so many “urgent” items that provide short term gain, while serious risks that have yet to materialized remain at the bottom of the list. I dare say that most of us have on occasion prevented a serious disaster by individually pushing some item within our control through. However, the bigger issues require courage and initiative on a collaborative level. It may be easier to ignore big risks when dealing with them is costly, complex and requires collaboration…. but we do best to remember that survival demands courage….