article thumbnail

Exploring the Alicia Korenman Graphic Novels Collection (1983-2007)

Archives Blogs

For those interested in Eisner Week activities, there are two events happening in the Bradley Reading Room in Strozier Library from March 1-7: March 5: Graphic Novel Literacy Panel – [link]. Special Collections & Archives encourage students, faculty, and members of. March 7: A Conversation with Will Eisner- [link].

article thumbnail

AIIM vs. ARMA: An Honest Comparison of Membership

AIIM

As a paid professional member of both since 2001 – August 2001 for AIIM, September 2001 for ARMA, and having served on both organizations’ Board of Directors (2004-2005 for AIIM, 2007-2010 for ARMA), I have thoughts on both and will compare them in several key areas, including: Focus. Chapters and Local Events. Types of Membership.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top 8 Cybersecurity Podcasts of 2021

eSecurity Planet

It requires some baseline industry knowledge, but it’s a great way to stay on top of InfoSec current events. Since 2007 (before podcasting in general had really taken off), Patrick Gray and his co-host Adam Boileau have covered a wide range of InfoSec topics with insight from fellow industry leaders. Malicious Life.

article thumbnail

North Korea-linked Zinc group posed as Samsung recruiters to target security firms

Security Affairs

This threat actor has been active since at least 2009, possibly as early as 2007, and it was involved in both cyber espionage campaigns and sabotage activities aimed to destroy data and disrupt systems. The Visual Studio project was containing a malicious DLL that would be executed when researchers compiled the project.

Security 131
article thumbnail

ESET analyzes Turla APT’s usage of weaponized PowerShell

Security Affairs

Turla group has been active since at least 2007 targeting government organizations and private businesses. “ We have seen Turla operators use two persistence methods: A Windows Management Instrumentation (WMI) event subscription Alteration of the PowerShell profile (profile.ps1 file).”

Libraries 103
article thumbnail

Public Panels Scheduled Next Week to Discuss Priorities in Declassification Review

Archives Blogs

For those unable to attend this event in person at McGowan Theater, live streaming of the NDC panel will be available on NARA’s YouTube Channel. As with the morning panel, registration to attend the event in person is required before midnight EDT March 10, 2020, and NARA will live stream this multi-agency forum on YouTube. to 3:30 p.m.,

FOIA 26
article thumbnail

Microsoft: North Korea-linked Zinc APT targets security experts

Security Affairs

This threat actor has been active since at least 2009, possibly as early as 2007, and it was involved in both cyber espionage campaigns and sabotage activities aimed to destroy data and disrupt systems. The activity of the Zinc APT group, aka Lazarus, surged in 2014 and 2015, its members used mostly custom-tailored malware in their attacks.

Security 121