Enabling Effective Communication

Data Breach Today

Why building sound communication and documentation practices is critical to construction projects. In a previous article, we discussed three important areas of project management and ended by briefly discussing project communication. For any company, it is a good exercise to ask how deliberate your project communication is. Far too often, communication occurs in passing at someone’s desk or in convoluted email chains.

The M.D. Anderson Case and the Future of HIPAA Enforcement via Privacy + Security Blog by Daniel Solove

IG Guru

14, 2001), the 5th Circuit struck down a fine and enforcement action by HHS as arbitrary and capricious. The U.S. Court of Appeals for the 5th Circuit just issued a blistering attack on HIPAA enforcement by the U.S. Department of Health and Human Services (HHS). In University of Texas M.D.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Unseen 9/11 photos bought at house clearance sale

IG Guru

June 19 2019 via BBC News Archivists who bought a stash of CDs at a house clearance sale found 2,400 photos of Ground Zero in New York taken following the 9/11 attacks in 2001. They appear to have been taken by an as yet unidentified construction worker who helped to clear up the wreckage of […]. The post Unseen 9/11 photos bought at house clearance sale appeared first on IG GURU. Archives Information Governance Record Retention Records Management Storage 9/11 photos

Sales 48

Remembering 9/11

Unwritten Record

On September 11, 2001, four coordinated terrorist attacks were committed against the United States when two hijacked planes were flown into the North and South Towers at the World Trade Center, a third hit the Pentagon in Washington, D.C.,

Tapping your stores of unstructured data can yield new insights…

OpenText Information Management

Nick is the firm’s lead analyst for AI and machine learning, an area he has been researching since 2001. Note: This blog is by guest author Nick Patience, Founder & Research Vice President of 451 Research. Almost every company wants to be data-driven. According to 451 Research survey data, 91% of organizations claim that at … The post Tapping your stores of unstructured data can yield new insights… appeared first on OpenText Blogs.

Lockbit ransomware gang claims to have breached the Italian Revenue Agency

Security Affairs

“The Revenue Agency, operational since 1 January 2001, was born from the reorganization of the Financial Administration following the Legislative Decree No. The ransomware group Lockbit claims to have stolen 78 GB of files from the Italian Revenue Agency (Agenzia delle Entrate).

Lancelot & Elaine

Archives Blogs

It was produced by WNYC’s Scott Borden and Gads Hill for a broadcast on February 11, 2001. The story of Lancelot and Elaine is based on Alfred Lord Tennyson’s poem Idylls of the King. The production features Christopher Cartmill and Kathleen O’Grady. Jo Ann Allen introduces the production. Engineering by George Wellington. English

Steel sheet giant Hoa Sen Group hacked by Maze ransomware operators

Security Affairs

The Hoa Sen Group (HSG) was founded in the year 2001, it has 7,100 employees across all its 343 companies and has been earning annual revenue of around $1.18

DocuWare Appoints Chief Revenue Officer to Accelerate Global Growth in the Cloud

Info Source

After holding senior positions with Siemens AG and construction software specialist Nemetschek, Max Ertl joined DocuWare in 2001 with responsibility for marketing. million in 2001 to around € 44 million in 2017. New Windsor NY, January 11, 2018 – DocuWare, provider of cloud solutions for document management and workflow automation, has promoted Max Ertl to the position of Chief Revenue Officer.

Sales 40

Russians Shut Down Huge Card Fraud Ring

Krebs on Security

” According to cyber intelligence firm Intel 471 , Stroganov has been a long-standing member of major underground forums since at least 2001. Federal investigators in Russia have charged at least 25 people accused of operating a sprawling international credit card theft ring.

Retail 226

NIST’s Post-Quantum Cryptography Standards

Schneier on Security

NIST is an old hand at this competitive process, having previously done this with symmetric algorithms (AES in 2001) and hash functions (SHA-3 in 2015). Quantum computing is a completely new paradigm for computers.

A New Wayback: Improving Web Archive Replay

Archive-It

It will more easily facilitate future feature developments and continues the legacy of Wayback software as the original, most widely used, and most actively maintained web archive replay tool since its original release in 2001. Wayback Machine access on archive.org in 2001.

IT 41

Phishers Target Anti-Money Laundering Officers at U.S. Credit Unions

Krebs on Security

The USA Patriot Act , passed in the wake of the terror attacks of Sept 11, 2001, requires all financial institutions to appoint at least two Bank Secrecy Act (BSA) contacts responsible for reporting suspicious financial transactions that may be associated with money laundering. A highly targeted, malware-laced phishing campaign landed in the inboxes of multiple credit unions last week.

Email Provider VFEmail Suffers ‘Catastrophic’ Hack

Krebs on Security

Founded in 2001 and based in Milwaukee, Wisc., Email provider VFEmail has suffered what the company is calling “catastrophic destruction” at the hands of an as-yet unknown intruder who trashed all of the company’s primary and backup data in the United States. The firm’s founder says he now fears some 18 years’ worth of customer email may be gone forever. VFEmail provides email service to businesses and end users.

International data transfers: an opinion the EDPB (probably) won’t publish

Data Protector

One of the consequences of the Scherms II decision is that EU organisations need to take greater care in determining how best to protect the flows of personal data outside the EU.

How DMARC Can Protect Against Ransomware

eSecurity Planet

IPv6 : v=spf1 ip6 :2001:4860:4860::8888 ip6 :2001:4860:4860::8844 -all. Domain-based Message Authentication, Reporting, and Conformance ( DMARC ) began gaining traction a few years ago as a way to validate the authenticity of emails.

Red TIM Research found two rare flaws in Ericsson OSS-RC component

Security Affairs

Below is the list of flaws reported to the vendor since 2001 and included in the National Vulnerability Database of the United States of America.

COUNTDOWN TO IBM THINK WITH IBM CHAMPION JØRN THYSSEN

Rocket Software

Favorite IBM product : IBM Db2 for z/OS, as it is the engine, but my favorite tool is IBM Db2 Administration Tool as I’ve used it since Day 1 (June 2001) in my professional career. This year, a record-breaking number of Rocket employees were named as 2020 IBM Champions—13 to be exact.

AIIM vs. ARMA: An Honest Comparison of Membership

AIIM

As a paid professional member of both since 2001 – August 2001 for AIIM, September 2001 for ARMA, and having served on both organizations’ Board of Directors (2004-2005 for AIIM, 2007-2010 for ARMA), I have thoughts on both and will compare them in several key areas, including: Focus.

The First Post 9/11 Phone-In: Richard Hake Sitting-in For Brian Lehrer

Archives Blogs

On September 18, 2001, The late Richard Hake sat-in for Brian Lehrer at Columbia University’s new studios at WKCR. Just one week after the attack on the World Trade Center, WNYC was broadcasting on FM at reduced power from the Empire State Building and over WNYE (91.5

CIPL Celebrates Two Decades of Data Policy Innovation

Hunton Privacy

The Centre for Information Policy Leadership (“CIPL”), a global privacy and security think tank founded in 2001 by leading companies and Hunton Andrews Kurth LLP, is celebrating 20 years of working with industry leaders, regulatory authorities and policymakers to develop global solutions and best practices for privacy and responsible data use.

Empowering a Multigenerational Workforce

Rocket Software

Generation Z (2001 to 2020) want authentic employers and prioritize flexibility and transparency in their work environments. For the first time, we currently have five generations in the workplace.

SAML: Still Going Strong After Two Decades

eSecurity Planet

In 2001, the Organization for the Advanced for Structured Information Standards (OASIS) began work on what would become an industry-first XML framework for exchanging authentication and authorization data.

What is the Value of Records and Information Management?

AIIM

What is the value of Records and Information Management? To help answer that, take a quick mental inventory of all the technologies your organization utilizes that interact in some way with organizational information.

Vulnerability Finding Using Machine Learning

Schneier on Security

Since 2001 Microsoft has collected 13 million work items and bugs. Microsoft is training a machine-learning system to find software bugs : At Microsoft, 47,000 developers generate nearly 30 thousand bugs a month. These items get stored across over 100 AzureDevOps and GitHub repositories.

Standard contractual clauses and data transfers after Schrems II: EDPB-EDPS Joint Opinion on Draft SCCs

DLA Piper Privacy Matters

The Draft SCCs would repeal the existing SCCs (dating from 2001, 2004 and 2010) and would introduce one set of modular SCCs, useable in the four different scenarios or “modules” (either controller to controller, controller to processor, processor to processor, or processor to controller).

MY TAKE: A path for SMBs to achieve security maturity: start small controlling privileged accounts

The Last Watchdog

Some context about remote desktop controls: Back in 2001, when company networks were assembled around on-premises data centers, Microsoft began including RDC in all versions of Windows. The challenge of embracing digital transformation while also quelling the accompanying cyber risks has never been greater for small- and mid-sized businesses. Related: How ‘PAM’ improves authentication. SMBs today face a daunting balancing act.

Getting Things Done - the art of efficiency, productivity & organizational clarity

Collaboration 2.0

GTD has gone on to sell over 2 million copies since it was published in 2001 and is available I had the pleasure of attending the GTD summit last week: the inaugural conference arranged by The David Allen Company around the GTD methodology outlined in Allen’s book ‘Getting Things Done: The art of stress free productivity‘.

IT 55

Visual Cues and Clues: Born-Digital Photographs and their Metadata

Unwritten Record

Archives 2 Facility Views:] Archives 2, early 2001. However, the metadata for this photograph indicates in the Title field this is “Archives II, early 2001.” Instead of using “II” to search, if we search “Archives 2 early 2001” in the catalog, we find the exact photograph.

What Happened to Cyber 9/11?

Schneier on Security

Let's ask the question more generally: why hasn't there been another 9/11 since 2001? A recent article in the Atlantic asks why we haven't seen a"cyber 9/11" in the past fifteen or so years. (I, I, too, remember the increasingly frantic and fearful warnings of a "cyber Peal Harbor," "cyber Katrina" -- when that was a thing -- or "cyber 9/11." I made fun of those warnings back then.) The author's answer: Three main barriers are likely preventing this.

GUEST ESSAY: ‘Tis the season — to take proactive measures to improve data governance

The Last Watchdog

About the essayist: Todd Feinman is president and CEO of Identity Finder , co-founding the company in 2001. The holiday season is upon us and the bright lights and greenery aren’t the only indicators that we’ve reached December. Sadly, data breaches often occur at this time of year. Recently we’ve seen major news stories about breaches at Starwood Hotels and Quora. Related podcast: The need to lock down unstructured data.

Estonia sues Gemalto for 152M euros over flaws in citizen ID cards issued by the company

Security Affairs

The Estonian electronic ID cards have been manufactured by the Swiss company Trub AG and its successor Gemalto AG since 2001. Estonian sues Gemalto for 152 million euros following the security flaws in the citizen ID cards issued by the company that caused their recall in 2017. Estonian authorities sue the security firm Gemalto for 152 million euros following the security flaws in the citizen ID cards issued by the company that caused their recall in 2017.

Web application exposures continue do bedevil companies as digital transformation accelerates

The Last Watchdog

The San Jose, CA-based security vendor has been helping companies protect their web applications since the company was founded in 2001 by world-renowned ethical hacker Jeremiah Grossman , who also happens to be a black belt in Brazilian Jiu-Jitsu, as well as a native of my home state, Hawaii. As sure as the sun will rise in the morning, hackers will poke and prod at the web applications companies rely on – and find fresh weaknesses they can exploit.

ESET PROTECT Advanced Review: Features & Benefits

eSecurity Planet

After the dissolution of the Soviet Union, ESET was formally established in 1992 and later started subsidiaries in the United States (1999), Czech Republic (2001), Poland (2008), and Canada (2012).

MDM 86

A Mergers-Acquisitions-Investments Update and a CloudNine Product Update: eDiscovery Trends

eDiscovery Daily

As always, the best resource for tracking eDiscovery Mergers, Acquisitions, and Investments is Rob Robinson’s ComplexDiscovery site – after all, Rob via ComplexDiscovery has noted more than 375 M&A+I events between November 2001 and today. This is the most active January since the inception of eDiscovery ecosystem M&A+I pattern tracking in November 2001. To wit: Q1 2019’s 16 transactions are more than all but one year from 2001 to 2009.

MY TAKE: The back story on the convergence, continuing evolution of endpoint security

The Last Watchdog

In 1990, Florin and Mariuca Talpes parlayed a $300 stake borrowed from a relative into a company which would become Bitdefender in 2001. No one in cybersecurity refers to “antivirus” protection any more. The technology that corrals malicious software circulating through desktop PCs, laptops and mobile devices has evolved into a multi-layered security technology referred to as ‘endpoint security.’. This designation change unfolded a few years back.

DocuWare Announces Leadership Transition

Info Source

Max Ertl joined DocuWare in 2001. million in 2001 to approximately € 44 million in 2017.

Sales 40

Implementing Information Management on SharePoint and Office365

AIIM

Since its humble beginnings in 2001, it has grown to nearly 200 million seats and is found in every industry sector. It's hard to overestimate the impact of SharePoint on the information management market. If you're reading this blog post, you likely have SharePoint in your organization. But SharePoint can't magically make your information more accessible.

ROT 58

The Unattributable "db8151dd" Data Breach

Troy Hunt

Met at the 6th National Pro Bono Conference in Ottawa in September 2016 Met on 15-17 October 2001 in Vancouver for the Luscar/Obed/Coal Valley arbitration. I was reticent to write this blog post because it leaves a lot of questions unanswered, questions that we should be able to answer.

National Cybersecurity Alliance advocates ‘shared responsibility’ for securing the Internet

The Last Watchdog

The National Cyber Security Alliance is a non-profit group, underwritten by the top tech companies and biggest banks, that has been out there since 2001 promoting best practices and supplying programs to engrain this mindset in our society. The targeting of Sen. Claire McCaskill by Russian intelligency agency hackers, as she runs for re-election, underscores the need for each individual and organization to take online privacy and security as a core part of our everyday lives.