article thumbnail

e-Records 2020 Call for Presentations

The Texas Record

The conference gathers records management and information technology staff from the state and local level together to learn from each other by sharing case studies, solutions, best practices, challenges, and lessons learned. The deadline for submitting presentation proposals is FRIDAY, September 4, 2020.

article thumbnail

Analysis: A Better Approach to Cyber Defense

Data Breach Today

The latest edition of the ISMG Security Report discusses why cyber defense teams need to think more like attackers. Plus, a case study on cross-border payment fraud, and an expert's take on security for the 2020 elections.

Security 113
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

5 best online cyber security training courses and certifications in 2020

IT Governance

With the coronavirus pandemic keeping us stuck inside and struggling to find ways to remain productive, now might be the perfect time to take an online cyber security training course. Let’s take a look at five of the best online courses for cyber security. Certified Cyber Security Foundation Training Course.

article thumbnail

[Podcast] Achieving Cloud Content Harmony – Access with Control

AIIM

This powerful technology and its massively scalable storage and operational power can crunch large sets of data, use analytics to understand it, and provide the security needed to lock it all down. Also on this episode, hear a case study on how Qualcomm worked with Automation Anywhere to improve and automate their key business processes.

Cloud 125
article thumbnail

Security Affairs newsletter Round 258

Security Affairs

The best news of the week with Security Affairs. addresses two zero-days exploited in the wild Microsofts case study: Emotet took down an entire network in just 8 days New Coronavirus-themed campaign spread Lokibot worldwide. The post Security Affairs newsletter Round 258 appeared first on Security Affairs.

article thumbnail

Security experts targeted with malicious CVE PoC exploits on GitHub

Security Affairs

Most of the malicious detections are related to vulnerabilities from 2020. During their research the experts found multiple examples of malicious PoC developed for CVEs and shared some case studies. The post Security experts targeted with malicious CVE PoC exploits on GitHub appeared first on Security Affairs.

article thumbnail

Boffins devise a new side-channel attack affecting all AMD CPUs

Security Affairs

A group of researchers from the Graz University of Technology and CISPA Helmholtz Center for Information Security devised a new side-channel attack that affects AMD CPUs. Experts demonstrated their attack technique with multiple case studies in real-world scenarios. . SecurityAffairs – hacking, cyber security).