article thumbnail

Kevin Mitnick, Hacker Turned Cybersecurity Leader, Dies at 59

eSecurity Planet

Once dubbed “the world’s most wanted hacker” after his youthful exploits attacking Digital Equipment Corporation and Pacific Bell, Mitnick completed his decade-long transition to cybersecurity luminary when he joined KnowBe4 as Chief Hacking Officer and part owner in 2011. Mitnick’s Legacy The U.S.

article thumbnail

Documentation Theory for Information Governance

ARMA International

iv] Further, “the practices of government [and other public and private institutions] become formal or official to the extent that they are documented.” [v] This article aims to consider what a documentary focus can offer to the practices and understandings of information governance. Are digital documents fixed or fluid?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: Here’s why penetration testing has become a ‘must-have’ security practice

The Last Watchdog

Yes, and that is what Sony exactly lost when they were hacked and the personal info of every one of its customers leaked in 2011. For example, your website security may prove strong, applications not so much. Compliance, governance. Huge sum, right? Related: Supply-chain hacks prove worrisome. Reinforcing positives.

Security 233
article thumbnail

Government disrupted

ChiefTech

I first got involved with the Government 2.0 This does not mean that Government 2.0 Cloud-computing is firmly on the agenda in federal and state government (although not necessarily always in a way that suits the dominate cloud-computing vendors ). At the same time, I also see a natural fragmentation as Government 2.0

article thumbnail

FAQ: Are text messages records? (redux)

The Texas Record

In that time, the popularity of text messaging (“texting”) has skyrocketed while awareness that text messages (“texts”) are potentially government records has increased very little. The definition of a government record in Texas is media neutral. Believe it or not, you can conduct government business via text message.

article thumbnail

Time for Australian government to wake up to mobile?

ChiefTech

Less than a quarter of the Australian Government's regular websites can be considered smartphone or mobile-friendly, according to a survey conducted by iTnews. A survey by the ITNews concludes that government Websites fail mobile access tests. Now, there are some very good examples of government in Australia using mobile.

article thumbnail

Is Zoom safe to use?

IT Governance

For example, The Intercept reported that video calls are not end-to-end encrypted, despite the company’s claims that they are. Perhaps that’s true, but it could just as easily be an example of Hanlon’s razor: “never attribute to malice that which is adequately explained by stupidity” – although perhaps ‘negligence’ is the more accurate term.

Passwords 137