Remove 11
Remove 2014 Remove Article Remove Government Remove Tools
article thumbnail

Documentation Theory for Information Governance

ARMA International

This article is part of a collaboration between ARMA and AIEF and is included in Information Management Magazine, ARMA-AIEF Special Edition , which will be available for download in November. This article aims to consider what a documentary focus can offer to the practices and understandings of information governance.

article thumbnail

Kazakhstan wants to intercept all HTTPS Internet traffic of its citizens

Security Affairs

Bad news for citizens of Kazakhstan, the government is beginning to intercept all the encrypted traffic, and to do it, it is forcing them to install a certificate. The Kazakhstan government is beginning to intercept all the encrypted traffic and to do it is forcing users in the country to install a certificate. ” states Tele2.

IT 82
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Mobile Libraries: Culture on the Go

Unwritten Record

Mallet’s Reserve American boys with French Army Transport Service ( 165-WW-26C-11 ). government used bookmobiles to promote a concept known as “cultural diplomacy.” Broadly speaking, the use of cultural diplomacy as a tool of U.S. government to uphold American foreign policy through public diplomacy.

article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

This discussion includes methods, tools, and techniques such as using personae and identifying use cases that have high business value, while minimizing project risks. The previous article –Part 2 of this 3-part series – discussed DT by imagining how the “art of the possible” can help define the end state of the DT journey.

article thumbnail

Chronicle of a Records Manager: Controlling the Chaos of Disaster Response and Recovery

ARMA International

This article will focus on the latter and will reflect on my experiences, observations, and insights as well as the trials and tribulations of the project. I used the pictures and notes I wrote throughout the response and recovery to produce the damage and loss report as well as this article. That night at 11 p.m., Peterson, A.

article thumbnail

Security Affairs newsletter Round 268

Security Affairs

Every week the best security articles from Security Affairs free for you in your email box. Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. Copyright (C) 2014 Media.net Advertising FZ-LLC All Rights Reserved -->. Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->.

article thumbnail

APT28 and Upcoming Elections: evidence of possible interference

Security Affairs

A copy of the Daily Express’ article published back in February. This Office password protection could be easily bypassed using the classic malware analysis tools and after the code extraction, it’s possible to analyze the plain-text code as follows. This document actually is the first step of a more complex cyber attack.