Remove 2014 Remove Government Remove Libraries Remove Mining
article thumbnail

Weekly podcast: Browsealoud cryptojacking, Bee Token phishing and Olympic attacks

IT Governance

This week, we discuss the use of cryptocurrency mining software on numerous government websites, a phishing scam that robbed Bee Token investors of $1 million and cyber attacks on the Pyeongchang Winter Olympics. Here are this week’s stories. Some call it cryptojacking. and NHS sites in the UK. That’ll do for this week.

article thumbnail

Security Affairs newsletter Round 228

Security Affairs

At least 23 Texas local governments targeted by coordinated ransomware attacks. A backdoor mechanism found in tens of Ruby libraries. Employees abused systems at Ukrainian nuclear power plant to mine cryptocurrency. Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. Once again thank you!

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Weekly podcast: 2018 end-of-year roundup

IT Governance

Hello and welcome to the final IT Governance podcast of 2018. As is now traditional, I’ve installed myself in the porter’s chair next to the fire in the library, ready to recap some of the year’s more newsworthy information security events. The post Weekly podcast: 2018 end-of-year roundup appeared first on IT Governance Blog.

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

Srivastav 2014) See Figure 1 (HistoryComputer 2021). For example, organizations can re-package video libraries, songs, research, and course material for different audiences – customers, researchers, academics, students, and so on; and they can monetize the content via CaaS. Then, in 2014 came Blockchain 2.0

article thumbnail

Know your rights: the key to eBook access

CILIP

Maintaining the status quo for public libraries ? Here he speaks to Rob Mackinlay about why not challenging the methods used by publishers to protect their content will damage not only libraries, but also threatens research and innovation. ?Publishers He sees licensing as an existential threat to libraries, saying: ?I?m

Access 52
article thumbnail

Part 2: OMG! Not another digital transformation article! Is it about the evolution from RIM to Content Services?

ARMA International

While these RIM practices are still important to help ensure governance, compliance, and manage risks, it is also important to realize that information is both a product and a service. Information Governance (IG). Discussions of IG often lead to a discussion of data governance (DG) and whether the two are different.

article thumbnail

Establishing Records Management at Brandeis—The First Eighteen Months

Brandeis Records Manager

Our initial client service engagements—managed offsite storage and retrieval, secure document shredding, digitization, and, recently, electronic redaction—began in March of 2014. Books on institutional functions, like finance, law, student records, HR, advancement, etc., Services and Stakeholders. Communication Tools and Policy.