article thumbnail

Connecting town and gown through the library

CILIP

Connecting town and gown through the library How to help a community explore its slave-trading history: Lesley English, Head of Library Engagement at Lancaster University Library, explains how the library plays a key role in building bridges between town and gown. We connect, we innovate, we include.”

article thumbnail

Episode 232: Log4j Won’t Go Away (And What To Do About It.)

The Security Ledger

in of the firm ReversingLabs joins us to talk about Log4Shell, the vulnerability in the ubiquitous Log4j Apache library. Related Stories Spotlight: How Secrets Sprawl Undermines Software Supply Chain Security Episode 227: What’s Fueling Cyber Attacks on Agriculture ? Log4j: A Very Popular Library. Tomislav Peri?in

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Spotlight: How Secrets Sprawl Undermines Software Supply Chain Security

The Security Ledger

The post Spotlight: How Secrets Sprawl Undermines Software Supply Chain Security appeared first on The Security Ledger with Paul F. Related Stories Episode 227: What’s Fueling Cyber Attacks on Agriculture ? As always, you can check our full conversation in our latest Security Ledger podcast at Blubrry.

article thumbnail

Lawsuit Seeks Food Benefits Stolen By Skimmers

Krebs on Security

The Massachusetts SNAP benefits card looks more like a library card than a payment card. Department of Agriculture (USDA) — which funds the program that states draw from — to change its policies and allow states to replace stolen benefits with federal funds. Deborah Harris is a staff attorney at the MLRI. But on Oct.

article thumbnail

The Week in Cyber Security and Data Privacy: 12 – 18 February 2024

IT Governance

Fowler sent a responsible disclosure notice when he discovered the database and it was secured the following day. Source New Telecoms USA Yes 6,158 Nabholz Construction Company Employee Welfare Health Plan Source 1 ; source 2 New Healthcare USA Yes 5,326 Dawson James Securities, Inc. North Hill Home Health Care, Inc.,

article thumbnail

Episode 233: Unpacking Log4Shell’s Un-coordinated Disclosure Chaos

The Security Ledger

In this episode of the podcast (#233) Mark Stanislav, a Vice President at the firm Gemini, joins Paul to talk about what went wrong with disclosure of Log4Shell, the critical, remote code execution flaw in the Log4j open source library. As always, you can check our full conversation in our latest Security Ledger podcast at Blubrry.

article thumbnail

The Week in Cyber Security and Data Privacy: 5 – 11 February 2024

IT Governance

Compromised data includes policyholders’ and their families’ civil status, dates of birth and social security numbers, as well as the name of their health insurer and information relating to their contracts. It has since been confirmed by Anukul Peedkaew, the permanent secretary of social development and human security.