Remove Authentication Remove Exercises Remove Mining Remove Security
article thumbnail

Weekly podcast: 2018 end-of-year roundup

IT Governance

This week, in our last podcast of the year, we revisit some of the biggest information security stories from the past 12 months. As is now traditional, I’ve installed myself in the porter’s chair next to the fire in the library, ready to recap some of the year’s more newsworthy information security events. caused problems of their own.

article thumbnail

How to Tackle the Information Management Challenges of Legacy Applications

AIIM

And relying on legacy technology creates business risk because these older systems are much harder to fix when things go wrong and more vulnerable to security threats. Relocating the data from a legacy system to a modern ECM system is also a relatively simple one-off exercise that should quickly pay for itself.

ECM 167
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CyberheistNews Vol 13 #27 [Heads Up] Massive Impersonation Phishing Campaign Imitates Over 100 Brands and Thousands of Domains

KnowBe4

But I don't think an attack of such magnitude as the one identified by security researchers at Internet security monitoring vendor Bolster. This latest impersonation campaign makes the case for ensuring users are vigilant when interacting with the web – something accomplished through continual Security Awareness Training.

article thumbnail

DB2 10 for z/OS and Enterprise Identity Mapping

Robert's Db2

OK, now imagine you're a security administrator. For several reasons, however, the RACF IDs that you use are different in form from the network IDs that the end users utilize for client-side authentication. That trusted context would define the circumstances in which the privileges granted to a role could be exercised by a user.

article thumbnail

The 773 Million Record "Collection #1" Data Breach

Troy Hunt

I've written before about what's involved in verifying data breaches and it's often a non-trivial exercise. If @1Password was to integrate with my newly released Pwned Passwords k-Anonymity model so you could securely check your exposure against the service (it'd have to be opt in, of course). Oh wow - look at this!

article thumbnail

The Trouble with Politicians Sharing Passwords

Troy Hunt

I read this while wandering around in LA on my way home from sitting in front of US Congress and explaining security principles to a government so it felt like a timely opportunity to share my own view on the matter: This illustrates a fundamental lack of privacy and security education. needs to meet this need and be secure also.

article thumbnail

How to Track Your Kids (and Other People's Kids) With the TicTocTrack Watch

Troy Hunt

Two months later, critical security flaws still remained in some of the watches tested , the most egregious of which was with Gator's product: Adding to the severity of the issues, Gator Norge gave the customers of the Gator2 watches a new Gator3 watch as compensation. Around a year later, Pen Test Partners in the UK found more security bugs.

Passwords 111