Remove Article Remove Authentication Remove Case Study Remove Government
article thumbnail

Summary – “Blockchain Technology and Recordkeeping”

ARMA International

This article summarizes a report published by AIEF on May 30, 2019. Additionally, the article is included in Information Management Magazine, ARMA-AIEF Special Edition , which will be available for download in November. View the PDF version of the article. The full report is available at [link].

article thumbnail

The Hacker Mind Podcast: The Internet As A Pen Test

ForAllSecure

So maybe the government steps in and makes it easier for that organization to get insurance? GRAY: One of the other questions that you know has been a big one in the last year, so is should the government come in and subsidize, subsidize and establish a base insurance capability? Yeah, we're all good. These are becoming.

article thumbnail

Types of Malware & Best Malware Protection Practices

eSecurity Planet

This article dives into the lexicon of malware, offering descriptions, protections, and examples of each. As you browse the myriad of malicious software featured in this article, we offer tips for how best to defend against each type. As a term, crimeware encompasses much of the malware types listed in this article.

Phishing 105