Remove Education Remove Examples Remove Military Remove Presentation
article thumbnail

Catches of the Month: Phishing Scams for March 2022

IT Governance

The Ukrainian government and its military were targeted by DDoS (distributed denial-of-service) attacks, while a pro-Ukrainian group attacked the Belarusian railway system with ransomware after discovering that it was being used by Russia to transport tanks and weapons.

Phishing 144
article thumbnail

New Director of Records Management Training

National Archives Records Express

I first became involved in the training field during my time in the military. While completing my degree in education, I worked as a supplemental instructor and an educational technologist. I enjoy reading mostly nonfiction topics; such, as educational psychology, sociology, performance support, and health and fitness.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Have We Become Apathetic About Breaches?

Thales Cloud Protection & Licensing

An incensed population began to demand companies secure their personal information, because the consumerization of the threat was a clear and present danger. One such example is the recent disclosure that military personnel wearing Strava devices are revealing highly sensitive information about their locations and activities.

IoT 89
article thumbnail

A User’s Guide to World War II-Era Radio in the National Archives

Unwritten Record

Some of the obstacles presented to placing recording online include rights issues, about which more appears at the end of this post, and the many generations of copies of the original recordings. For example, the original materials in 208-GENERALa are transcription discs.

article thumbnail

Is the federal government ready for robotic process automation?

CGI

Don’t think of the shambling, clanking humanoid automatons from 1950s sci-fi, or even the sleek bomb-disposal robots used today by the military and police departments. The software robots, or “bots,” used in RPA vastly eclipse the utility of more rudimentary forms of automation (for example, scripts or command line utilities).

article thumbnail

Snowden Ten Years Later

Schneier on Security

I paged through weekly reports, presentation slides from status meetings, and general briefings to educate visitors. The meeting presenters try to spice things up. Presentations regularly include intelligence success stories. We technologists did a lot to help secure the Internet, for example.

article thumbnail

2022 Cyber Security Review of the Year

IT Governance

Tensions rose throughout February as the Russian military amassed across the Ukrainian border. Although Vladimir Putin and his sympathisers assured the world that they were simply conducting military exercises, the inevitable occurred on 24 February, when troops mobilised and war was declared. Source: Security Affairs.

Security 132