Enabling Effective Communication

Data Breach Today

Why building sound communication and documentation practices is critical to construction projects. In a previous article, we discussed three important areas of project management and ended by briefly discussing project communication. For any company, it is a good exercise to ask how deliberate your project communication is. Far too often, communication occurs in passing at someone’s desk or in convoluted email chains.

The M.D. Anderson Case and the Future of HIPAA Enforcement via Privacy + Security Blog by Daniel Solove

IG Guru

14, 2001), the 5th Circuit struck down a fine and enforcement action by HHS as arbitrary and capricious. The U.S. Court of Appeals for the 5th Circuit just issued a blistering attack on HIPAA enforcement by the U.S. Department of Health and Human Services (HHS). In University of Texas M.D.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Unseen 9/11 photos bought at house clearance sale

IG Guru

June 19 2019 via BBC News Archivists who bought a stash of CDs at a house clearance sale found 2,400 photos of Ground Zero in New York taken following the 9/11 attacks in 2001. They appear to have been taken by an as yet unidentified construction worker who helped to clear up the wreckage of […]. The post Unseen 9/11 photos bought at house clearance sale appeared first on IG GURU. Archives Information Governance Record Retention Records Management Storage 9/11 photos

Sales 62

Tapping your stores of unstructured data can yield new insights…

OpenText Information Management

Nick is the firm’s lead analyst for AI and machine learning, an area he has been researching since 2001. Note: This blog is by guest author Nick Patience, Founder & Research Vice President of 451 Research. Almost every company wants to be data-driven. According to 451 Research survey data, 91% of organizations claim that at … The post Tapping your stores of unstructured data can yield new insights… appeared first on OpenText Blogs.

ARMA Southwest Region’s IGP/CRM Workshop announced in Houston, TX

IG Guru

Track 1: Becoming a Certified Information Governance Professional (IGP) Track 2: ICRM Exam Prep: Introduction and Parts 1-6 (CRM): Event – Apache Corporation Conference Center 2000 Post Oak Boulevard, Houston, Texas 77056-4400 Hotel – Hilton Houston Post Oak by the Galleria 2001 Post Oak […]. CONFERENCE REGISTRATION IS OPEN Choose your certification and prep for success!

Steel sheet giant Hoa Sen Group hacked by Maze ransomware operators

Security Affairs

The Hoa Sen Group (HSG) was founded in the year 2001, it has 7,100 employees across all its 343 companies and has been earning annual revenue of around $1.18

Russians Shut Down Huge Card Fraud Ring

Krebs on Security

” According to cyber intelligence firm Intel 471 , Stroganov has been a long-standing member of major underground forums since at least 2001. Federal investigators in Russia have charged at least 25 people accused of operating a sprawling international credit card theft ring.

Retail 227

International data transfers: an opinion the EDPB (probably) won’t publish

Data Protector

One of the consequences of the Scherms II decision is that EU organisations need to take greater care in determining how best to protect the flows of personal data outside the EU.

DocuWare Appoints Chief Revenue Officer to Accelerate Global Growth in the Cloud

Document Imaging Report

After holding senior positions with Siemens AG and construction software specialist Nemetschek, Max Ertl joined DocuWare in 2001 with responsibility for marketing. million in 2001 to around € 44 million in 2017. New Windsor NY, January 11, 2018 – DocuWare, provider of cloud solutions for document management and workflow automation, has promoted Max Ertl to the position of Chief Revenue Officer.

Sales 40

The First Post 9/11 Phone-In: Richard Hake Sitting-in For Brian Lehrer

Archives Blogs

On September 18, 2001, The late Richard Hake sat-in for Brian Lehrer at Columbia University’s new studios at WKCR. Just one week after the attack on the World Trade Center, WNYC was broadcasting on FM at reduced power from the Empire State Building and over WNYE (91.5

What is the Value of Records and Information Management?

AIIM

What is the value of Records and Information Management? To help answer that, take a quick mental inventory of all the technologies your organization utilizes that interact in some way with organizational information.

Phishers Target Anti-Money Laundering Officers at U.S. Credit Unions

Krebs on Security

The USA Patriot Act , passed in the wake of the terror attacks of Sept 11, 2001, requires all financial institutions to appoint at least two Bank Secrecy Act (BSA) contacts responsible for reporting suspicious financial transactions that may be associated with money laundering. A highly targeted, malware-laced phishing campaign landed in the inboxes of multiple credit unions last week.

Email Provider VFEmail Suffers ‘Catastrophic’ Hack

Krebs on Security

Founded in 2001 and based in Milwaukee, Wisc., Email provider VFEmail has suffered what the company is calling “catastrophic destruction” at the hands of an as-yet unknown intruder who trashed all of the company’s primary and backup data in the United States. The firm’s founder says he now fears some 18 years’ worth of customer email may be gone forever. VFEmail provides email service to businesses and end users.

COUNTDOWN TO IBM THINK WITH IBM CHAMPION JØRN THYSSEN

Rocket Software

Favorite IBM product : IBM Db2 for z/OS, as it is the engine, but my favorite tool is IBM Db2 Administration Tool as I’ve used it since Day 1 (June 2001) in my professional career. This year, a record-breaking number of Rocket employees were named as 2020 IBM Champions—13 to be exact.

AIIM vs. ARMA: An Honest Comparison of Membership

AIIM

As a paid professional member of both since 2001 – August 2001 for AIIM, September 2001 for ARMA, and having served on both organizations’ Board of Directors (2004-2005 for AIIM, 2007-2010 for ARMA), I have thoughts on both and will compare them in several key areas, including: Focus.

Vulnerability Finding Using Machine Learning

Schneier on Security

Since 2001 Microsoft has collected 13 million work items and bugs. Microsoft is training a machine-learning system to find software bugs : At Microsoft, 47,000 developers generate nearly 30 thousand bugs a month. These items get stored across over 100 AzureDevOps and GitHub repositories.

IoT 98

The Unattributable "db8151dd" Data Breach

Troy Hunt

Met at the 6th National Pro Bono Conference in Ottawa in September 2016 Met on 15-17 October 2001 in Vancouver for the Luscar/Obed/Coal Valley arbitration. I was reticent to write this blog post because it leaves a lot of questions unanswered, questions that we should be able to answer.

Web application exposures continue do bedevil companies as digital transformation accelerates

The Last Watchdog

The San Jose, CA-based security vendor has been helping companies protect their web applications since the company was founded in 2001 by world-renowned ethical hacker Jeremiah Grossman , who also happens to be a black belt in Brazilian Jiu-Jitsu, as well as a native of my home state, Hawaii. As sure as the sun will rise in the morning, hackers will poke and prod at the web applications companies rely on – and find fresh weaknesses they can exploit.

NSA Equation Group tool was used by Chinese hackers years before it was leaked online

Security Affairs

In 2015, Kaspersky first spotted the NSA Equation Group, it revealed it was operating since at least 2001 and targeted almost any industry with sophisticated zero-day malware.

IT 84

Estonia sues Gemalto for 152M euros over flaws in citizen ID cards issued by the company

Security Affairs

The Estonian electronic ID cards have been manufactured by the Swiss company Trub AG and its successor Gemalto AG since 2001. Estonian sues Gemalto for 152 million euros following the security flaws in the citizen ID cards issued by the company that caused their recall in 2017. Estonian authorities sue the security firm Gemalto for 152 million euros following the security flaws in the citizen ID cards issued by the company that caused their recall in 2017.

MY TAKE: The back story on the convergence, continuing evolution of endpoint security

The Last Watchdog

In 1990, Florin and Mariuca Talpes parlayed a $300 stake borrowed from a relative into a company which would become Bitdefender in 2001. No one in cybersecurity refers to “antivirus” protection any more. The technology that corrals malicious software circulating through desktop PCs, laptops and mobile devices has evolved into a multi-layered security technology referred to as ‘endpoint security.’. This designation change unfolded a few years back.

What Happened to Cyber 9/11?

Schneier on Security

Let's ask the question more generally: why hasn't there been another 9/11 since 2001? A recent article in the Atlantic asks why we haven't seen a"cyber 9/11" in the past fifteen or so years. (I, I, too, remember the increasingly frantic and fearful warnings of a "cyber Peal Harbor," "cyber Katrina" -- when that was a thing -- or "cyber 9/11." I made fun of those warnings back then.) The author's answer: Three main barriers are likely preventing this.

Risk 73

National Cybersecurity Alliance advocates ‘shared responsibility’ for securing the Internet

The Last Watchdog

The National Cyber Security Alliance is a non-profit group, underwritten by the top tech companies and biggest banks, that has been out there since 2001 promoting best practices and supplying programs to engrain this mindset in our society. The targeting of Sen. Claire McCaskill by Russian intelligency agency hackers, as she runs for re-election, underscores the need for each individual and organization to take online privacy and security as a core part of our everyday lives.

GUEST ESSAY: ‘Tis the season — to take proactive measures to improve data governance

The Last Watchdog

About the essayist: Todd Feinman is president and CEO of Identity Finder , co-founding the company in 2001. The holiday season is upon us and the bright lights and greenery aren’t the only indicators that we’ve reached December. Sadly, data breaches often occur at this time of year. Recently we’ve seen major news stories about breaches at Starwood Hotels and Quora. Related podcast: The need to lock down unstructured data.

Getting Things Done - the art of efficiency, productivity & organizational clarity

Collaboration 2.0

GTD has gone on to sell over 2 million copies since it was published in 2001 and is available I had the pleasure of attending the GTD summit last week: the inaugural conference arranged by The David Allen Company around the GTD methodology outlined in Allen’s book ‘Getting Things Done: The art of stress free productivity‘.

IT 55

What companies need to know about ‘SecOps’ — the path to making ‘digital transformation’ secure

The Last Watchdog

Denim Group was originally founded in 2001 doing custom software development and eventually expanded its offerings to focus on application security, helping organizations deal with the security impact of the software they were developing. DevOps has been around for a while now, accelerating the creation of leading edge business applications by blending the development side with the operations side.

A Mergers-Acquisitions-Investments Update and a CloudNine Product Update: eDiscovery Trends

eDiscovery Daily

As always, the best resource for tracking eDiscovery Mergers, Acquisitions, and Investments is Rob Robinson’s ComplexDiscovery site – after all, Rob via ComplexDiscovery has noted more than 375 M&A+I events between November 2001 and today. This is the most active January since the inception of eDiscovery ecosystem M&A+I pattern tracking in November 2001. To wit: Q1 2019’s 16 transactions are more than all but one year from 2001 to 2009.

Episode 180: Gary McGraw on Machine Learning Security Risks

The Security Ledger

Stories about machines acting logically – but based on faulty or incorrect assumptions – are the fuel for science fiction tales ranging from 2001: A Space Odyssey (Arthur C.

Risk 52

DocuWare Announces Leadership Transition

Document Imaging Report

Max Ertl joined DocuWare in 2001. million in 2001 to approximately € 44 million in 2017.

Sales 40

Mainframes, Freight Trains and Education Pains

Rocket Software

To be fair, I was in school in the early aughts, from 2001 to 2004; this type of talk was fully accepted. By David Robertson , guest blogger. When I was in college, I had an instructor that, for all intents and purposes, was viewed as a relic.

Co-op Radio fonds now available!

Archives Blogs

In the mid-1990s, Co-op Radio moved locations to 337 Carrall Street and then again to 370 Columbia in 2001. Cover of Co-operative Radio Listener’s Guide (April/June 2001).

Finding Positive Opportunity in Social Distancing

AIIM

I earned my bachelor's degree in 2001, and even then, we had online learning and examinations. It's no secret that I'm passionate about training and information management. I delivered the first AIIM public training course in the U.S. in January 2006.

Calculating the Benefits of the Advanced Encryption Standard

Schneier on Security

It released a study of the economic impact of DES in 2001. NIST has completed a study -- it was published last year, but I just saw it recently -- calculating the costs and benefits of the Advanced Encryption Standard. From the conclusion: The result of performing that operation on the series of cumulated benefits extrapolated for the 169 survey respondents finds that present value of benefits from today's perspective is approximately $8.9 billion.

Implementing Information Management on SharePoint and Office365

AIIM

Since its humble beginnings in 2001, it has grown to nearly 200 million seats and is found in every industry sector. It's hard to overestimate the impact of SharePoint on the information management market. If you're reading this blog post, you likely have SharePoint in your organization. But SharePoint can't magically make your information more accessible.

ROT 58

PlayStation - The Perils of Secrecy: is it Game Over?

Collaboration 2.0

Sony partnered with Toshiba and IBM in 2001 to begin creation of the ‘Cell’ processor - a powerful, state of the art Microsoft’s XBox 360’s core technology was essentially funded and developed by Sony without them knowing, as detailed in the excellent book ‘The Race for a New Games Machine‘ by David Shippy and Mickie Phipps.

IT 40

Identity-based Cryptography

Thales Cloud Protection & Licensing

The first practical IBE scheme was given by Boneh and Franklin [7] in 2001 using bilinear pairing on elliptic curves. Since 2001, various extensions of normal IBE/IBS have been proposed: Identity-based signcrypt schemes. In Colin Boyd, editor, Advances in Cryptology – ASIACRYPT 2001, pages 514–532. 213-229, 2001. Public key infrastructure (PKI) requires key distribution and has been long criticised for its usability issues [13,14,15].

Vladimir Putin ‘s computers still run Windows XP, Media reports

Security Affairs

“Windows XP, released in 2001, was the last Microsoft operating system given the green light for use on official Russian government computers, the Open Media website reported, citing defence ministry documents.”

Nostalgia by Hironori Katagiri

Archives Blogs

“Nostalgia” was made while Katagiri was artist in residence at the Scottish Sculpture Workshop in Lumsden as part of the Japan 2001 Festival. This week’s #BeConnected Explore Our Campus looks at Nostalgia by Hironori Katagiri.

IT 26

Mary’s Annual Internet Trends

John Battelle's Searchblog

The Internet Summit had its last event in July of 2001, and the space was taken over by Kara Swisher and Walt Mossberg, who went on to launch All Things Digital , which has thrived to this day. The post Mary’s Annual Internet Trends appeared first on John Battelle's Search Blog. Waaay back in the late 1990s, I started a conference called the Internet Summit.

IT 68

UN approves Russia-Cina sponsored resolution on new cybercrime convention

Security Affairs

The US government expresses concerns about the resolution and remarked that it was more important to expand the existing 2001 Budapest Convention on cybercrime that promoted international cooperation to curb online crimes.