article thumbnail

Sophie Sayer on the IT Governance Partner Programme

IT Governance

The benefits of partnering with us, and our partner-exclusive event IT Governance launched its partner programme in 2017, which now includes more than 400 organisations. And why should organisations consider partnering with IT Governance? What is it that makes IT Governance special? What else can partners expect from the event?

article thumbnail

Documentation Theory for Information Governance

ARMA International

iv] Further, “the practices of government [and other public and private institutions] become formal or official to the extent that they are documented.” [v] This article aims to consider what a documentary focus can offer to the practices and understandings of information governance. But what exactly is documentation?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

When Your Smart ID Card Reader Comes With Malware

Krebs on Security

government employees and contractors have been issued a secure smart ID card that enables physical access to buildings and controlled spaces, and provides access to government computer networks and systems at the cardholder’s appropriate security level. government smart cards. government smart cards.

article thumbnail

US CISA added 17 flaws to its Known Exploited Vulnerabilities Catalog

Security Affairs

One of the issues added this week is a vulnerability in the October CMS, tracked as CVE-2021-32648 , which was recently exploited in attacks against websites of the Ukrainian government. The company pointed out that all the attack attempts failed. Follow me on Twitter: @securityaffairs and Facebook. Pierluigi Paganini.

CMS 101
article thumbnail

Information Governance Challenges and How to Address Them

Gimmal

Craig Carpenter and Dean Gonsowski , Gimmal’s CEO and CRO respectively, spoke with Ari about information discovery, migration, governance, and compliance, and how Gimmal helps organization address their biggest information governance challenges. It started as a GRC — governance risk and compliance — consulting firm.

article thumbnail

Chinese Antivirus Firm Was Part of APT41 ‘Supply Chain’ Attack

Krebs on Security

The government alleges the men used malware-laced phishing emails and “supply chain” attacks to steal data from companies and their customers. Justice Department this week indicted seven Chinese nationals for a decade-long hacking spree that targeted more than 100 high-tech and online gaming companies. Tan DaiLin, a.k.a.

article thumbnail

Russian Cybersecurity Executive Arrested for Alleged Role in 2012 Megahacks

Krebs on Security

Experts say Kislitsin’s prosecution could soon put the Kazakhstan government in a sticky diplomatic position, as the Kremlin is already signaling that it intends to block his extradition to the United States. Burkov was arrested in 2015 by Israeli authorities, and the Russian government fought Burkov’s extradition to the U.S.