Remove Access Remove Course Remove Libraries Remove Military
article thumbnail

A Framework for Remembrance: NARA Contributes Holocaust Films to EU Project

Unwritten Record

The project, called Visual History of the Holocaust (VHH), is multi-faceted, with goals of providing access to the footage itself and and tools to analyze the images and curate collections for research and education. . Those reels are a significant part of a major project funded by the European Union’s Horizon 2020 program.

article thumbnail

MY TAKE: How advanced automation of threat intel sharing has quickened incident response

The Last Watchdog

military complex, who got frustrated by their inability to extract actionable intel from a deluge of threat feeds. ThreatQuotient was in this vanguard and helped introduce the use of threat libraries — receptacles for intel coming in from different teams. Threat actors will innovate, of course.

Big data 153
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Archives Records 2019 RMS Annual Meeting

The Schedule

Kelly Spring, Access Archivist at East Carolina University, described their work process for migrating data into ArchivesSpace from Archivists’ Toolkit and other homegrown databases. He recognized that the government archives identified the seat of power, so he sent a military detachment to remove the records from Austin.

article thumbnail

Weekly podcast: 2018 end-of-year roundup

IT Governance

As is now traditional, I’ve installed myself in the porter’s chair next to the fire in the library, ready to recap some of the year’s more newsworthy information security events. And, of course, on 25 May the GDPR came into effect. Hello and welcome to the final IT Governance podcast of 2018. million payment cards and 1.2

article thumbnail

The Week in Cyber Security and Data Privacy: 5 – 11 February 2024

IT Governance

Further victims of last year’s Perry Johnson & Associates data breach identified Last year, the medical transcription company PJ&A (Perry Johnson & Associates) suffered a data breach in which an unauthorised third party was able to access its computer network.

article thumbnail

The Hacker Mind Podcast: Going Passwordless

ForAllSecure

Simon Moffatt from CyberHut joins The Hacker Mind to discuss how identity and access management (IAM) is fundamental to everything we do online today, and why even multi-factor access, while an improvement, needs to yield to more effortless and more secure passwordless technology that’s coming soon. Something better? Lewis: Good.

article thumbnail

EP 49: LoL

ForAllSecure

You know, what's exciting for us is we started this business that when we came from NSA and said you know what, there is a large, unaddressed market that doesn't have access to expertise. And what they'll do is they'll use a legitimate program that depends on the library, bring malicious libraries with them, they get something sideways.