Remove 11
article thumbnail

Documentation Theory for Information Governance

ARMA International

This framework “places a specific document, or documents, at the center of observation, study, and analysis and thereby develops documentary dialogues about and for it, uses the document to better illuminate its contexts, and integrates the document in teaching and researching information.” Cambridge: The MIT Press, 2005. Bibliography.

article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

lazydocker : A simple terminal UI for both docker and docker-compose : [link] pic.twitter.com/HsK17rzg8m — Binni Shah (@binitamshah) July 1, 2019. Facebook Plans on Backdooring WhatsApp [link] — Schneier Blog (@schneierblog) August 1, 2019. — Jason Haddix (@Jhaddix) July 27, 2019. Brian Krebs | @briankrebs.

article thumbnail

The bleak picture of two-factor authentication adoption in the wild

Elie

Performing a longitudinal analysis highlights that the adoption rate of 2FA (two-factor authentication) has been mostly stagnant over the last five years, despite the ever increasing number of accounts hijacked due to the. It is something that I hope we can do in 2019 - so, if you are interested in contributing, drop me a note!