This is the old ChiefTech blog.: Enterprise 2.0 in 2006 and into 2007

ChiefTech

in 2006 and into 2007 No time to comment on these, but Ive had them flagged for a while a posts of interest about Enterprise 2.0 in 2006 (see his predictions for 2007 below); On the Collaboration Loop blog, Larry Cannell explains why there is more to Enterprise 2.0 This is the old ChiefTech blog. Nice of you to drop in and visit. However, you need to come over and see my new blog at chieftech.com.au. ©2005-2009. ©2005-2009.

This is the old ChiefTech blog.: Slides from Rebooting the Enterprise (11 Oct 2006)

ChiefTech

Tuesday, 18 September 2007 Slides from Rebooting the Enterprise (11 Oct 2006) In anticipation of sharing my workshop slides later in the week, I have finally bitten the bullet [point!] This is the old ChiefTech blog. Nice of you to drop in and visit. However, you need to come over and see my new blog at chieftech.com.au. ©2005-2009. ©2005-2009. Disclaimer: Information on this blog is of a general nature and represents my own independent opinion.

Paper 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

WEF: 217 More Years Until Women and Men Reach Economic Equality

Dark Reading

Progress toward economic parity is in reverse for the first time since 2006, but cybersecurity can help change the game

A very brief history of cloud computing

DXC

You can argue over when cloud computing really began, but one good starting point is 2006 when then Google CEO Eric Schmidt said at a conference: “I don’t think people have really understood how big this opportunity really is. It starts with the premise that the data services and architecture should be on servers. We call […]. Cloud Platform Uncategorized

Cloud 85

NSA Attacks Against Virtual Private Networks

Schneier on Security

A 2006 document from the Snowden archives outlines successful NSA operations against "a number of "high potential" virtual private networks, including those of media organization Al Jazeera, the Iraqi military and internet service organizations, and a number of airline reservation systems.".

Fears over DNA privacy as 23andMe goes public in deal with Richard Branson

The Guardian Data Protection

Launched in 2006, 23andMe sells tests to determine consumers’ genetic ancestry and risk of developing certain illnesses, using saliva samples sent in by mail. Genetic testing company with 10 million customers’ data has ‘huge cybersecurity implications’ The genetic testing company 23andMe will go public through a partnership with a firm backed by the billionaire Richard Branson, in a deal that has raised fresh privacy questions about the information of millions of customers.

Needless Panic Over a Wi-FI Network Name

Schneier on Security

In 2006, I wrote an essay titled " Refuse to be Terrorized." (I A Turkish Airlines flight made an emergency landing because someone named his wireless network (presumably from his smartphone) "bomb on board.". I am also reminded of my 2007 essay, " The War on the Unexpected." A decade later, it seems that the frequency of incidents like the one above is less, although not zero. Progress, I suppose. airtravel overreactions warontheunexpected wifi wireless

IT 67

Chinese Antivirus Firm Was Part of APT41 ‘Supply Chain’ Attack

Krebs on Security

According to iDefense, in 2006 the group was responsible for crafting a rootkit that took advantage of a zero-day vulnerability in Microsoft Word, and was used in attacks on “a large DoD entity” within the USA. The U.S.

Mining 262

Deutsche Telekom sells data by turning clunkers into smart cars

Information Management Resources

Europe’s largest phone carrier is offering owners of cars built 2006 or later a service that will monitor driving data and turn the vehicle into a Wi-Fi hotspot. Hardware and software Driverless Mobile technology

28

A Light at the End of Liberty Reserve’s Demise?

Krebs on Security

” The government says from 2006 until the service’s takedown, Liberty Reserve processed an estimated 55 million financial transactions worth more than $6 billion, with more than 600,000 accounts associated with users in the United States alone. In May 2013, the U.S.

Bart Gellman on Snowden

Schneier on Security

This isn't news; we learned about this in 2006. Bart Gellman's long-awaited (at least by me) book on Edward Snowden, Dark Mirror: Edward Snowden and the American Surveillance State , will finally be published in a couple of weeks. There is an adapted excerpt in the Atlantic.

Russians Shut Down Huge Card Fraud Ring

Krebs on Security

In 2006, Stroganov and an associate Gerasim Silivanon (a.k.a. Federal investigators in Russia have charged at least 25 people accused of operating a sprawling international credit card theft ring.

Retail 227

Hacked Data Broker Accounts Fueled Phony COVID Loans, Unemployment Claims

Krebs on Security

In 2006, The Washington Post reported that a group of five men used stolen or illegally created accounts at LexisNexis subsidiaries to lookup SSNs and other personal information more than 310,000 individuals.

The Evolving Risk in Aging Legacy Applications

Hanzo Learning Center

A white paper by Carl Weber fired a warning shot in 2006, when software had grown quickly into Software-as-a-Service: Application RetirementThe time gap between what defines modern apps and legacy apps is constricting as fast as a rubber band. At this point, actually, we’re watching it happen like that frog in the metaphor of the boiling water: Artificial intelligence, powered by metadata and the right set of rules, is already morphing today’s apps into applications ready for retirement.

Crooks target US universities with malware used by nation-state actors

Security Affairs

Hupigon is a remote access Trojan (RAT) that has been active since at least 2006, it was first detected by FireEye in 2010. Several US universities and colleges were targeted in phishing attacks aimed at delivering malware previously used by China-linked APT groups.

SHARED INTEL: How ransomware evolved from consumer trickery to deep enterprise hacks

The Last Watchdog

The Archiveus Trojan from 2006 was the first one to use RSA cipher, but it was reminiscent of a proof of concept and used a static 30-digit decryption password that was shortly cracked. Ransomware is undoubtedly one of the most unnerving phenomena in the cyber threat landscape.

Experts found three new 15-year-old bugs in a Linux kernel module

Security Affairs

The flaws were present in the component since it was being developed in 2006. Three 15-year-old flaws in Linux kernel could be exploited by local attackers with basic user privileges to gain root privileges on vulnerable Linux systems.

Risk 113

How to Overcome the 4 Most Common Obstacles to Invoice Automation

Docuware

In 2006, there was a popular movie starring Matthew McConaughey and Sarah Jessica Parkercalled Failure to Launch. The film focuses on a 35-year-old man who lives in the home of his parents and shows no interest in leaving the comfortable life his parents, especially his mother, have made for him there.

31

Tribute: Rick Ocasek

Archives Blogs

On November 11, 2006 Ric Ocasek, vocalist and front man of The Cars, spoke to Leonard Lopate about a new DVD featuring never-before-seen live performances from the band’s US tours. The DVD, The Cars Unlocked was sourced from footage he had in his basement. English

20

Crooks target US universities with malware used by nation-state actors

Security Affairs

Hupigon is a remote access Trojan (RAT) that has been active since at least 2006, it was first detected by FireEye in 2010. Several US universities and colleges were targeted in phishing attacks aimed at delivering malware previously used by China-linked APT groups.

Revoked NARA Bulletins

National Archives Records Express

July 12, 2006. Over the past several months, we have undertaken a review of NARA bulletins to determine if any require revisions or should be revoked. NARA Bulletin 2019-01 notifies agencies that the following bulletins are no longer needed or do not reflect current policy: Bulletin Number and Title. Date Issued. 2006-03 : Availability of the Federal Enterprise Architecture Records Management Profile, version 1.0. December 23, 2005.

New Report: The Cost of Data Breaches

Rippleshot

To put the evolution of data breaches into context, IBM's data said the average cost of a data breach to a company has doubled since 2006 — to more than $8 million in the U.S. The fallout from the Equifax breach has kept companies and financial institutions on high alert for how their customers are impacted by evolving fraud schemes. Newly released data from IBM this week confirms what many already suspect: Data breaches are getting much, much worse.

How we ended up in an era of intentional ignorance

WIRED Threat Level

Firstly, because I was an early-ish analyst blogger in the learning space (2006) and blogged the same way the writer did back then (quick commentary vs in-depth analysis) and secondly, it’s a sad and accurate story of how we got to where we are today – from WordPress-powered “Hello World” reflective blogs to memes and to trolls on Reddit – basically, a whole bunch of garbage.

SHARED INTEL: Mobile apps are riddled with security flaws, many of which go unremediated

The Last Watchdog

Also, WhiteHat has been generating this report annually since 2006. The convergence of DevOps and SecOps is steadily gaining traction in the global marketplace. Some fresh evidence of this encouraging trend comes to us by way of shared intelligence from WhiteHat Security. Related: The tie between DevOps and SecOps.

NASA data breach – The agency notifies employees of a security intrusion

Security Affairs

The Space Agency confirmed that the breach may impact NASA Civil Service employees on-boarded, separated from the agency, or transferred between centers from July 2006 to October 2018. National Aeronautics and Space Administration (NASA) notifies employees of a data breach that exposed social security numbers and other personal information.

This is the old ChiefTech blog.: The "E" has it

ChiefTech

This is the old ChiefTech blog. Nice of you to drop in and visit. However, you need to come over and see my new blog at chieftech.com.au. ©2005-2009. ©2005-2009. Disclaimer: Information on this blog is of a general nature and represents my own independent opinion. Please seek advice for specific circumstances.

U.S. Supreme Court Sidesteps Important TCPA Deference Issues

HL Chronicle of Data Protection

The Fourth Circuit Court of Appeals vacated this decision, ruling that the Hobbs Act required the district court to defer to the FCC’s statutory interpretation of the rule as stated in the Commission’s 2006 Junk Fax Order. The Fourth Circuit found that PDR was procedurally barred from challenging the FCC’s interpretation in the Junk Fax Order because PDR did not file an appeal within 60 days after the FCC issued its final order in 2006, as required by the Hobbs Act.

Court: Production of Hard Copy Versions of Documents Also Kept As ESI Does Not “Run Afoul” of Rule 34

eDiscovery Law

34(b) advisory committee’s note to 2006 amendment. Ortega v. Mgmt. & & Training Corp., 16-cv-0665 MV/SMV, 2017 WL 3588818 (D.N.M. 1, 2017). In this case, Plaintiff sought to compel native/electronic production of documents previously produced in hard copy. Defendant claimed that the documents in question were “ordinarily kept by Defendant both electronically and in hard copy” and produced only the hard copy format.

IT 48

This is the old ChiefTech blog.: Uploaded to SlideShare: Enterprise RSS, What?

ChiefTech

This is the old ChiefTech blog. Nice of you to drop in and visit. However, you need to come over and see my new blog at chieftech.com.au. ©2005-2009. ©2005-2009. Disclaimer: Information on this blog is of a general nature and represents my own independent opinion. Please seek advice for specific circumstances. Sunday, 13 April 2008 Uploaded to SlideShare: Enterprise RSS, What?

Spotlight Podcast: Dr. Zulfikar Ramzan on RSA’s Next Act: Security Start-Up

The Security Ledger

The company which was acquired by storage giant EMC back in 2006 and then became a part of Dell when that company acquired EMC in 2015 re-emerges as an independent company this week, more than six months after it was acquired by a group of investors led by Symphony Technology Group.

Spotlight Podcast: CTO Zulfikar Ramzan on RSA’s Next Act: Security Start-Up

The Security Ledger

The company which was acquired by storage giant EMC back in 2006 and then became a part of Dell when that company acquired EMC in 2015 re-emerges as an independent company this week, more than six months after it was acquired by a group of investors led by Symphony Technology Group.

This is the old ChiefTech blog.: Interviews with Ward Cunningham and Ross Mayfield

ChiefTech

This is the old ChiefTech blog. Nice of you to drop in and visit. However, you need to come over and see my new blog at chieftech.com.au. ©2005-2009. ©2005-2009. Disclaimer: Information on this blog is of a general nature and represents my own independent opinion. Please seek advice for specific circumstances.

This is the old ChiefTech blog.: Update on planning the Enterprise RSS Day of Action

ChiefTech

This is the old ChiefTech blog. Nice of you to drop in and visit. However, you need to come over and see my new blog at chieftech.com.au. ©2005-2009. ©2005-2009. Disclaimer: Information on this blog is of a general nature and represents my own independent opinion. Please seek advice for specific circumstances.

This is the old ChiefTech blog.: Coverage of yesterday's Enterprise 2.0 Executive Forum

ChiefTech

This is the old ChiefTech blog. Nice of you to drop in and visit. However, you need to come over and see my new blog at chieftech.com.au. ©2005-2009. ©2005-2009. Disclaimer: Information on this blog is of a general nature and represents my own independent opinion. Please seek advice for specific circumstances. Wednesday, 20 February 2008 Coverage of yesterday's Enterprise 2.0 Executive Forum I attended yesterdays Enterprise 2.0

This is the old ChiefTech blog.: Now blogging on the E2EF blog

ChiefTech

This is the old ChiefTech blog. Nice of you to drop in and visit. However, you need to come over and see my new blog at chieftech.com.au. ©2005-2009. ©2005-2009. Disclaimer: Information on this blog is of a general nature and represents my own independent opinion. Please seek advice for specific circumstances.

This is the old ChiefTech blog.: Lucas McDonnell discusses wikis versus forums

ChiefTech

This is the old ChiefTech blog. Nice of you to drop in and visit. However, you need to come over and see my new blog at chieftech.com.au. ©2005-2009. ©2005-2009. Disclaimer: Information on this blog is of a general nature and represents my own independent opinion. Please seek advice for specific circumstances.

This is the old ChiefTech blog.: One feed to rule them all - KM in Australia

ChiefTech

This is the old ChiefTech blog. Nice of you to drop in and visit. However, you need to come over and see my new blog at chieftech.com.au. ©2005-2009. ©2005-2009. Disclaimer: Information on this blog is of a general nature and represents my own independent opinion. Please seek advice for specific circumstances.

EVERTEAM.ARCHIVE NOW SUPPORTS SEDA/MEDONA (NF Z44-022) AND DEPIP (ISO 20614) DATA EXCHANGE STANDARDS

Everteam

is the latest version of the SEDA interoperability standard, which has been regularly revised since its first version in 2006. Paris, 29 October, 2019 – Everteam, a leading provider of enterprise content management and information governance software, is pleased to announce that its everteam.archive software now supports the SEDA (Data Exchange Standard for Archiving) 2.1, NF Z44-022 and ISO 20614 standards.

This is the old ChiefTech blog.: Ross Dawson on Enterprise 2.0 and the Future of Knowledge Management

ChiefTech

This is the old ChiefTech blog. Nice of you to drop in and visit. However, you need to come over and see my new blog at chieftech.com.au. ©2005-2009. ©2005-2009. Disclaimer: Information on this blog is of a general nature and represents my own independent opinion. Please seek advice for specific circumstances. Monday, 21 January 2008 Ross Dawson on Enterprise 2.0 and the Future of Knowledge Management Not only is the NSW KM Forum supporting Ross Enterprise 2.0

This is the old ChiefTech blog.: All Systems Go!

ChiefTech

This is the old ChiefTech blog. Nice of you to drop in and visit. However, you need to come over and see my new blog at chieftech.com.au. ©2005-2009. ©2005-2009. Disclaimer: Information on this blog is of a general nature and represents my own independent opinion. Please seek advice for specific circumstances. Monday, 21 January 2008 All Systems Go! Yes, even the best of us stuff up from time to time. Ive allowed my own domain name chieftech.com.au to expire over the weekend.