Enabling Effective Communication

Data Breach Today

Why building sound communication and documentation practices is critical to construction projects. In a previous article, we discussed three important areas of project management and ended by briefly discussing project communication.

Unseen 9/11 photos bought at house clearance sale

IG Guru

June 19 2019 via BBC News Archivists who bought a stash of CDs at a house clearance sale found 2,400 photos of Ground Zero in New York taken following the 9/11 attacks in 2001.

Sales 81

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Tapping your stores of unstructured data can yield new insights…

OpenText Information Management

Nick is the firm’s lead analyst for AI and machine learning, an area he has been researching since 2001. Note: This blog is by guest author Nick Patience, Founder & Research Vice President of 451 Research.

ARMA Southwest Region’s IGP/CRM Workshop announced in Houston, TX

IG Guru

CONFERENCE REGISTRATION IS OPEN Choose your certification and prep for success!

Russians Shut Down Huge Card Fraud Ring

Krebs on Security

” According to cyber intelligence firm Intel 471 , Stroganov has been a long-standing member of major underground forums since at least 2001. Federal investigators in Russia have charged at least 25 people accused of operating a sprawling international credit card theft ring.

Retail 204

DocuWare Appoints Chief Revenue Officer to Accelerate Global Growth in the Cloud

Document Imaging Report

After holding senior positions with Siemens AG and construction software specialist Nemetschek, Max Ertl joined DocuWare in 2001 with responsibility for marketing. million in 2001 to around € 44 million in 2017.

Sales 52

COUNTDOWN TO IBM THINK WITH IBM CHAMPION JØRN THYSSEN

Rocket Software

Favorite IBM product : IBM Db2 for z/OS, as it is the engine, but my favorite tool is IBM Db2 Administration Tool as I’ve used it since Day 1 (June 2001) in my professional career. This year, a record-breaking number of Rocket employees were named as 2020 IBM Champions—13 to be exact.

Phishers Target Anti-Money Laundering Officers at U.S. Credit Unions

Krebs on Security

The USA Patriot Act , passed in the wake of the terror attacks of Sept 11, 2001, requires all financial institutions to appoint at least two Bank Secrecy Act (BSA) contacts responsible for reporting suspicious financial transactions that may be associated with money laundering.

Lancelot & Elaine

Archives Blogs

It was produced by WNYC’s Scott Borden and Gads Hill for a broadcast on February 11, 2001. The story of Lancelot and Elaine is based on Alfred Lord Tennyson’s poem Idylls of the King. The production features Christopher Cartmill and Kathleen O’Grady. Jo Ann Allen introduces the production. Engineering by George Wellington. English

IT 20

Email Provider VFEmail Suffers ‘Catastrophic’ Hack

Krebs on Security

Founded in 2001 and based in Milwaukee, Wisc., Email provider VFEmail has suffered what the company is calling “catastrophic destruction” at the hands of an as-yet unknown intruder who trashed all of the company’s primary and backup data in the United States.

Vulnerability Finding Using Machine Learning

Schneier on Security

Since 2001 Microsoft has collected 13 million work items and bugs. Microsoft is training a machine-learning system to find software bugs : At Microsoft, 47,000 developers generate nearly 30 thousand bugs a month. These items get stored across over 100 AzureDevOps and GitHub repositories.

IoT 84

Nostalgia by Hironori Katagiri

Archives Blogs

“Nostalgia” was made while Katagiri was artist in residence at the Scottish Sculpture Workshop in Lumsden as part of the Japan 2001 Festival. This week’s #BeConnected Explore Our Campus looks at Nostalgia by Hironori Katagiri.

IT 26

The Unattributable "db8151dd" Data Breach

Troy Hunt

Met at the 6th National Pro Bono Conference in Ottawa in September 2016 Met on 15-17 October 2001 in Vancouver for the Luscar/Obed/Coal Valley arbitration. I was reticent to write this blog post because it leaves a lot of questions unanswered, questions that we should be able to answer.

Estonia sues Gemalto for 152M euros over flaws in citizen ID cards issued by the company

Security Affairs

The Estonian electronic ID cards have been manufactured by the Swiss company Trub AG and its successor Gemalto AG since 2001. Estonian sues Gemalto for 152 million euros following the security flaws in the citizen ID cards issued by the company that caused their recall in 2017.

Co-op Radio fonds now available!

Archives Blogs

In the mid-1990s, Co-op Radio moved locations to 337 Carrall Street and then again to 370 Columbia in 2001. Cover of Co-operative Radio Listener’s Guide (April/June 2001).

Identity-based Cryptography

Thales eSecurity

The first practical IBE scheme was given by Boneh and Franklin [7] in 2001 using bilinear pairing on elliptic curves. Since 2001, various extensions of normal IBE/IBS have been proposed: Identity-based signcrypt schemes. 213-229, 2001.

Mainframes, Freight Trains and Education Pains

Rocket Software

To be fair, I was in school in the early aughts, from 2001 to 2004; this type of talk was fully accepted. By David Robertson , guest blogger. When I was in college, I had an instructor that, for all intents and purposes, was viewed as a relic.

Web application exposures continue do bedevil companies as digital transformation accelerates

The Last Watchdog

The San Jose, CA-based security vendor has been helping companies protect their web applications since the company was founded in 2001 by world-renowned ethical hacker Jeremiah Grossman , who also happens to be a black belt in Brazilian Jiu-Jitsu, as well as a native of my home state, Hawaii. As sure as the sun will rise in the morning, hackers will poke and prod at the web applications companies rely on – and find fresh weaknesses they can exploit.

A Mergers-Acquisitions-Investments Update and a CloudNine Product Update: eDiscovery Trends

eDiscovery Daily

As always, the best resource for tracking eDiscovery Mergers, Acquisitions, and Investments is Rob Robinson’s ComplexDiscovery site – after all, Rob via ComplexDiscovery has noted more than 375 M&A+I events between November 2001 and today.

What Happened to Cyber 9/11?

Schneier on Security

Let's ask the question more generally: why hasn't there been another 9/11 since 2001? A recent article in the Atlantic asks why we haven't seen a"cyber 9/11" in the past fifteen or so years. (I,

Risk 80

MY TAKE: The back story on the convergence, continuing evolution of endpoint security

The Last Watchdog

In 1990, Florin and Mariuca Talpes parlayed a $300 stake borrowed from a relative into a company which would become Bitdefender in 2001. No one in cybersecurity refers to “antivirus” protection any more. The technology that corrals malicious software circulating through desktop PCs, laptops and mobile devices has evolved into a multi-layered security technology referred to as ‘endpoint security.’. This designation change unfolded a few years back.

Episode 180: Gary McGraw on Machine Learning Security Risks

The Security Ledger

Stories about machines acting logically – but based on faulty or incorrect assumptions – are the fuel for science fiction tales ranging from 2001: A Space Odyssey (Arthur C.

Risk 52

DocuWare Announces Leadership Transition

Document Imaging Report

Max Ertl joined DocuWare in 2001. million in 2001 to approximately € 44 million in 2017.

Sales 52

GUEST ESSAY: ‘Tis the season — to take proactive measures to improve data governance

The Last Watchdog

About the essayist: Todd Feinman is president and CEO of Identity Finder , co-founding the company in 2001. The holiday season is upon us and the bright lights and greenery aren’t the only indicators that we’ve reached December. Sadly, data breaches often occur at this time of year. Recently we’ve seen major news stories about breaches at Starwood Hotels and Quora. Related podcast: The need to lock down unstructured data.

National Cybersecurity Alliance advocates ‘shared responsibility’ for securing the Internet

The Last Watchdog

The National Cyber Security Alliance is a non-profit group, underwritten by the top tech companies and biggest banks, that has been out there since 2001 promoting best practices and supplying programs to engrain this mindset in our society. The targeting of Sen. Claire McCaskill by Russian intelligency agency hackers, as she runs for re-election, underscores the need for each individual and organization to take online privacy and security as a core part of our everyday lives.

Finding Positive Opportunity in Social Distancing

AIIM

I earned my bachelor's degree in 2001, and even then, we had online learning and examinations. It's no secret that I'm passionate about training and information management. I delivered the first AIIM public training course in the U.S. in January 2006.

What companies need to know about ‘SecOps’ — the path to making ‘digital transformation’ secure

The Last Watchdog

Denim Group was originally founded in 2001 doing custom software development and eventually expanded its offerings to focus on application security, helping organizations deal with the security impact of the software they were developing. DevOps has been around for a while now, accelerating the creation of leading edge business applications by blending the development side with the operations side.

Implementing Information Management on SharePoint and Office365

AIIM

Since its humble beginnings in 2001, it has grown to nearly 200 million seats and is found in every industry sector. It's hard to overestimate the impact of SharePoint on the information management market.

ROT 74

Getting Things Done - the art of efficiency, productivity & organizational clarity

Collaboration 2.0

GTD has gone on to sell over 2 million copies since it was published in 2001 and is available I had the pleasure of attending the GTD summit last week: the inaugural conference arranged by The David Allen Company around the GTD methodology outlined in Allen’s book ‘Getting Things Done: The art of stress free productivity‘.

IT 55

Calculating the Benefits of the Advanced Encryption Standard

Schneier on Security

It released a study of the economic impact of DES in 2001. NIST has completed a study -- it was published last year, but I just saw it recently -- calculating the costs and benefits of the Advanced Encryption Standard.

What Is DNS And Why Should Your Business Care?

Adam Levin

ICANN has been pointing out vulnerabilities in the DNS system since at least 2001 , and for the better part of the last decade urging companies to adopt the more secure Domain Name System Security Extensions, or DNSSEC. . The U.S.

Vladimir Putin ‘s computers still run Windows XP, Media reports

Security Affairs

“Windows XP, released in 2001, was the last Microsoft operating system given the green light for use on official Russian government computers, the Open Media website reported, citing defence ministry documents.”

Mary’s Annual Internet Trends

John Battelle's Searchblog

The Internet Summit had its last event in July of 2001, and the space was taken over by Kara Swisher and Walt Mossberg, who went on to launch All Things Digital , which has thrived to this day. The post Mary’s Annual Internet Trends appeared first on John Battelle's Search Blog.

IT 90

PlayStation - The Perils of Secrecy: is it Game Over?

Collaboration 2.0

Sony partnered with Toshiba and IBM in 2001 to begin creation of the ‘Cell’ processor - a powerful, state of the art Microsoft’s XBox 360’s core technology was essentially funded and developed by Sony without them knowing, as detailed in the excellent book ‘The Race for a New Games Machine‘ by David Shippy and Mickie Phipps.

IT 40

In memory of Dr. Nancy H. Marcus

Archives Blogs

Lawton Distinguished Professor in 2001, the highest honor that FSU faculty can award one of their own. We are saddened to hear of Dr. Nancy Marcus’ passing this last Monday. Dr. Marcus served at FSU in several roles for 30 years.

UN approves Russia-Cina sponsored resolution on new cybercrime convention

Security Affairs

The US government expresses concerns about the resolution and remarked that it was more important to expand the existing 2001 Budapest Convention on cybercrime that promoted international cooperation to curb online crimes.

Rebecca B. Rankin: Early Advocate for Public Access to Government Information

Archives Blogs

He wrote about Rankin’s use of radio in this book and in an earlier article for the journal Libraries and Culture in 2001. Spring 2001, pg. Rebecca B. Rankin was the Director of the Municipal Reference Library for the City of New York. Her work included the promotion of resources and services of the library to its clients.

The Language and Nature of Fileless Attacks Over Time

Lenny Zeltser

I traced the origins of “fileless” to 2001, when Eugene Kaspersky (of Kaskersky Labs) used it in reference to Code Red worm’s ability to exist solely in memory. The language of cybersecurity evolves in step with attack and defense tactics.

The strengths and weaknesses of different VPN protocols

Security Affairs

First released in 2001, the OpenVPN protocol has become one of the most popular and widely used protocols. One in four internet users use a VPN regularly, but how much does the average user know about what goes on behind the software?

Test page

CILIP

She has served the University of Kentucky Libraries since 2001, as associate dean for academic affairs and research, head of the Information Commons, and head of Desktop Support. TITLE. Facet Publishing announces the publication of the UK edition of Management Basics for Information Professionals, 4th edition , by G. Edward Evans and new co-author Stacey Greenwell. Since its initial publication this text has served as an essential resource for both LIS students and practitioners.