Remove 12
Remove 2015 Remove 2018 Remove Education Remove IT
article thumbnail

MY TAKE: Michigan’s cybersecurity readiness initiatives provide roadmap others should follow

The Last Watchdog

I was recently privileged to be part of a group of journalists covering the 2018 North American International Cyber Summit at Detroit’s Cobo Convention Center. Michigan is known as the Wolverine State in deference to the ornery quadruped that roams its wild country. This new nickname may not roll off the tongue. But it does fit like a glove.

article thumbnail

Trends in the library technology market ? a UK perspective

CILIP

His piece focuses on public libraries and libraries in higher education institutions. For example, winning the London Libraries Consortium in 2018 gave SirsiDynix 19 new library authority customers at a single stroke ? Libraries in Higher Education. In his 2020 Library Systems anoted, ?Technology library systems has diminished

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Copyright Card Game

CILIP

Copyright the Card Game is an open educational game resource designed to train educators and information / e-learning professionals in HE and other educational institutions in UK copyright law. The resource reflects the important changes to educational copyright exceptions in 2014. Slides March 2015?) Instructions.

article thumbnail

GUEST ESSAY: The story behind how DataTribe is helping to seed ‘Cybersecurity Valley’ in Maryland

The Last Watchdog

and Tenable, which went public in 2018 with a market capitalization of approximately $4 billion. has also attracted a powerful and growing flow of venture capital to the region – about $1 Billion in 2018 and growing at an incredible pace. cybersecurity job openings – 350,000 to be exact – is up from 209,000 in 2015.

article thumbnail

Key takeaways from the 2019 Verizon Data Breach Investigations Report

IT Governance

For an idea of how dramatic this change in tactic has been, consider that, since 2015, Verizon has found that point-of-sale breaches have decreased tenfold, while web application breaches occur thirteen times more often. Financially-motivated social engineering attacks are behind 12% of all breaches analysed.

article thumbnail

It’s Time for Your Annual “Mashup” of eDiscovery Market Estimates!: eDiscovery Trends

eDiscovery Daily

The first “mashup” covered estimates for 2012 to 2017 and the second one covered 2013 to 2018. Last year, we took a look how close the estimate was for 2018 back then. Last year, we took a look how close the estimate was for 2018 back then. This is the eighth(!) year we have covered the “mashup”(!) 66 billion. 67 billion.

article thumbnail

A Flurry of Recent Cybersecurity Activity from the Trump Administration

Data Matters

On May 22, 2018, the Secretaries issued the Botnet Report, which, consistent with longstanding Federal policy, promotes the longstanding partnership between the federal government and the private sector in combating cyber-attacks. Increase awareness and education across the ecosystem.”. On May 31, 2018, the U.S. in isolation.”.