Remove 2002 Remove IT Remove Libraries Remove Risk
article thumbnail

Part 2: OMG! Not another digital transformation article! Is it about the evolution from RIM to Content Services?

ARMA International

Part 3 will discuss how to manage the various DT risks. This discussion will include methods, tools, and techniques such as using personae and identifying use cases that have high business value, while minimizing project risks. Finally, Part 3 will look to the future, will present next steps, and will discuss key takeaways.

article thumbnail

Addressing the Spectrum of Risks

ForAllSecure

In this blog, we’ll walk through the spectrum of risk and the types of solutions that are strongest at addressing each risks. In this blog, we’ll walk through the spectrum of risk and the types of solutions that are strongest at addressing each risks. Find comfort in knowing that this is a common struggle.

Risk 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Addressing the Spectrum of Risks

ForAllSecure

In this blog, we’ll walk through the spectrum of risk and the types of solutions that are strongest at addressing each risks. In this blog, we’ll walk through the spectrum of risk and the types of solutions that are strongest at addressing each risks. Find comfort in knowing that this is a common struggle.

Risk 52
article thumbnail

House Passes Two Cybersecurity Bills

Hunton Privacy

4257), which modifies the Federal Information Security Management Act of 2002 to provide for automated and continuous monitoring of the security of government information systems. House of Representatives approved the Cyber Intelligence Sharing and Protection Act (“CISPA” or H.R. Cyber Intelligence Sharing and Protection Act.

article thumbnail

Space and Beyond: Locating NASA Photographs Using Online Indexes

Unwritten Record

255-CC: Color Photograph Files, 1965 – 2002. Any use of these items is made at the researcher’s or purchaser’s own risk. The photographs range in date between 1903 and 2011, and include subject matter such as daily operations, personnel, events, facilities, and come in the form of both analog and born-digital records.

article thumbnail

Film Preservation 101: Is Nitrate Film Really Dangerous?

Unwritten Record

When we do come across a reel in a new accession or a preservation request from one of the presidential libraries, I can tell you we’re not overly concerned that the film will burst into flames as we wind through it. In addition, the fumes produced when it burns are noxious and can sicken anyone in the vicinity. 64-NA-162 ( NAID 5928166 ).

article thumbnail

Top SD-WAN Solutions for Enterprise Security

eSecurity Planet

Launched in 2002 and specializing in wireless networking , Aruba Networks’ success led to its acquisition by Hewlett-Packard in 2015. Wide area networks have come a long way over the decades, and the introduction of cloud , edge , and virtual workloads only adds to the complexity of managing modern networks. Barracuda Networks.

Security 120