Remove tag security-rule
article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

That is almost 2000 times more data in less than 20 years (Press 2013, Patrizio 2018). Organizations use DRM technologies and solutions to securely manage intellectual property (IP) rights and monetize the content. When tagging and auto-classifying content, the AI engine can extract metadata to provide context to unstructured content.

article thumbnail

Guest Post -- New Global Data  and Privacy Regulations in 2018 and the GDPR

AIIM

We can be sure that issues like the Equifax breach and Yahoo’s recent disclosure of the scope of the 2013 breach will remain topics of discussion and litigation for some time to come. In 2002, EC Vice President, Commissioner Viviane Reding initially proposed reform to data privacy rules in the European Union. Global Policy Management.

GDPR 86
article thumbnail

The Hacker Mind Podcast: EP 69 Self-Healing Operating Systems

ForAllSecure

And, and that did that for 13 years and because of my involvement in critical infrastructure, I was asked by the White House to assist in developing the NIST cybersecurity framework in 2013. All kinds of security protections, different things. I was the head of the cybersecurity practice. We add Kubernetes via containerization.