article thumbnail

Learning, work and flexibility: a case study

CILIP

Learning, work and flexibility: a case study As part of our look at CILIP accredited courses we talk to Oona Ylinen, a part-time LIS student at UCL and Academic Support Librarian at University of Essex. Here she explains how she chose her course and her career and how an employer’s support with flexible working hours opened the door.

article thumbnail

CIPL Publishes White Paper on How the Legitimate Interest Ground for Processing Enables Responsible Data Use and Innovation

Hunton Privacy

On July 2, 2021, the Centre for Information Policy Leadership (“CIPL”) at Hunton Andrews Kurth published a white paper on How the Legitimate Interest Ground for Processing for Processing Enables Responsible Data Use and Innovation (the “Paper”).

Paper 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

e-Records 2021 Call for Presentations

The Texas Record

The conference gathers records management and information technology staff from the state and local level together to learn from each other by sharing case studies, solutions, best practices, challenges, and lessons learned. For more information about the 2021 e-Records conference, check out the conference website.

article thumbnail

Boffins devise a new side-channel attack affecting all AMD CPUs

Security Affairs

Experts demonstrated their attack technique with multiple case studies in real-world scenarios. . The flaws were collectively tracked as CVE-2021-26318 , according to AMD the medium severity flaws impacts all of its CHIPS. AMD acknowledged the findings and provided feedback on February 16th, 2021.

article thumbnail

Security experts targeted with malicious CVE PoC exploits on GitHub

Security Affairs

The experts analyzed PoCs shared on GitHub for known vulnerabilities discovered in 2017-2021, some of these repositories were used by threat actors to spread malware. ” reads the research paper published by the experts. of the studied repositories have symptoms of malicious intent). ” continues the paper.

article thumbnail

E-Discovery Day

The Texas Record

Join the records management assistance unit in celebrating E-Discovery Day on Friday, December 3, 2021! Official E-Discovery Day Website : Discover reports, guides, case studies, and webinars. Peer-Reviewed Research Paper (PDF): John C. What is E-Discovery?

article thumbnail

‘Trojan Source’ Bug Threatens the Security of All Code

Krebs on Security

” The research paper, which dubbed the vulnerability “ Trojan Source ,” notes that while both comments and strings will have syntax-specific semantics indicating their start and end, these bounds are not respected by Bidi overrides. The Trojan Source research paper is available here (PDF).

Security 363