Remove resources webinars-videos
article thumbnail

Disposition 101 Webinar Now Available

The Texas Record

We are very excited to announce the newly revamped Disposition 101 webinar, which is now available on our website along with several other free records management webinars and supplemental resources. Check out the Disposition 101 webinar page for the video recording, handouts and a certificate of completion.

article thumbnail

“At-Risk Meeting Notifier Zoom” feature alerts meeting organizers of Zoombombing risk

Security Affairs

The popular video conferencing application Zoom implemented the new “At-Risk Meeting Notifier” feature to warn of Zoombombing threat. “The At Risk Meeting Notifier scans public posts on social media sites and other public online resources for Zoom meeting links. ” reads the Zoom’s announcement.

Risk 96
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Texas Archives Month and Electronic Records Day

The Texas Record

The Texas State Library and Archives Commission (TSLAC) and the Texas Department of Information Resources (DIR) are offering a bountiful harvest of free and low-cost learning opportunities in October. The DIR Statewide Data Program overview offers ten short video segments based on the Data Management Book of Knowledge. LIVE EVENTS.

article thumbnail

Accenture + Collibra: 2023 data mesh reading list

Collibra

We have some great resources to get you up to speed on what data mesh is and why it’s important to your business: Data mesh overview Data mesh, not data mess : Podcast with Sonali Bhavsar, Managing Director for Global Data Governance, Accenture. Check out these additional resources. Still interested in learning more?

article thumbnail

Implementing Data Protection and Key Management in DevOps without slowing things down

Thales Cloud Protection & Licensing

In a recent webinar, “ Thales TalkingTrust with CyberArk – DevSecOps ”, two industry-leading companies discuss the importance of properly securing the ‘secret zero’. These are the critical credentials to access IT and other high value resources. The credentials providing this access need to be controlled and secured by encryption keys.

article thumbnail

Stop Ransomware in its Tracks With CipherTrust Transparent Encryption Ransomware Protection

Thales Cloud Protection & Licensing

The 10 recent ransomwares tested were: 1 Lockbit 2 BlackBasta 3 Rhysida 4 Hive 5 Akira 6 Trigona 7 Play 8 BianLian 9 MedusaLocker 10 Phobos See the video demonstrating how each attack was blocked. No code changes, threshold changes, or any other changes were made before, during or after any of the attacks.

article thumbnail

Using Enterprise Architecture, Data Modeling & Data Governance for Rapid Crisis Response

erwin

We want to help, so we built the erwin Rapid Response Resource Center. It provides free access to videos, webinars, courseware, simulations, frameworks and expert strategic advice leveraging the erwin EDGE platform for rapid response transformation during the COVID-19 crisis. Rapid Crisis Response. Questions for our experts?