Remove B2B Remove Blog Remove Mining Remove Security
article thumbnail

Polar Opposites: The CRM Exams and Vendor Product Language

Brandeis Records Manager

The content in this blog reflects the opinions of the author, and not of Brandeis University.). Mine has been a positive one, and I thank the ICRM for supporting the opportunity for measurable, professional validation. BYOD can introduce threats to the security of your organization’s information.”. George Despres.

article thumbnail

Fixing Data Breaches Part 2: Data Ownership & Minimisation

Troy Hunt

I wrote a free course for Varonis on GDPR earlier this year and I'm going to be referring to points from there quite a bit in this blog post. I don't feel I have to defend anything (other than other similar sized companies as mine just trying to float by amidst an economic recession, and all the problems that come with it.)