Downloads Home » About » Downloads The following SVG, EPS, and PNG files should be used for print publications. Please see our policies page for more information about how our logos may be used. CC logos and trademarks should always be downloaded from this page to ensure high quality. A safe, secure online space Online trust and security are often in the news these days. This week there were three events which remind us of this – and what we in Europe are doing to ensure it. First, the CEBIT conference in Hanover: where I saw a lot of political commitment to making the EU the world's safest online space – and a lot of the technological tools that could help in practice.
Live Documents - Office for the Internet Generation. Presentations, Spreadsheets, Word. The pre-eminent office productivity suite used by businesses worldwide is Microsoft Office - a set of twenty-year old applications that are still stuck to the desktop and have been completely untouched by the Internet zeitgeist. People still create documents on their desktop and use a variety of painful ways to share and manage these documents leading to spaghetti document versions and wasteful email cycles. Alternatives haven't taken off... The likes of Google have attempted to enlist the Internet to power their office applications (Google Docs) - however, the benefits that they bring to the table such as mobility and collaboration are offset by some inadequacies - lack of many features that users of Microsoft Office are familiar with and demand and loss of data and fidelity when you import/export your existing Microsoft Office documents. Presenting Live Documents - Office updated for the Internet Generation. Try it today - See for yourself.
15 Tools for Animation If you’re interested in creating content to promote your product or service, think about making a cartoon. Producing animation has several advantages over live video. You won’t need a physical set, a camera, or a crew. The Silver Lining Of The NSA Scandal It’s hard to imagine an organization of any kind having to deal with the level of backlash the NSA has had to since the spring of 2013. Between revelations about backdoor links into Internet giants like Google and Yahoo to the mass data collection program known as PRISM, and, more recently, spying via gaming platforms such as Second Life and World of Warcraft, it’s understandable that a majority of the public—68% according to recent polls—believe the NSA violates the privacy of some Americans with its intelligence-gathering techniques. The public outcry may be warranted, as Bruce Schneier has well documented, and many concerns related to these egregious (and likely unconstitutional) privacy and security violations certainly need to be addressed. But the truth is that for enterprise security folks, the threat to our privacy and data is not the NSA. If there is a silver lining to the NSA story, it’s that it brings visibility to the issue of data security.
Snowden social-engineered co-workers to share their passwords Posted on 11 November 2013. The revelations stemming from the documents exfiltrated by former NSA contractor Edward Snowden have changed the way we look at many things, but the details that have been trickling out about the way he went about getting access to those documents have also shown us how serious the insider threat can be. According to a report by Reuters based on disclosures from unnamed sources within the government, Snowden misused his status as a systems administrator to convince 20 to 25 NSA employees and his colleagues at the NSA regional operations center in Hawaii to hand over their login details for internal agency systems and networks. It is reported that “a handful” of these employees have already been identified and questioned about it, then removed from their jobs - whether temporary or permanently is yet unknown.