Remove Blockchain Remove Blog Remove Industry Remove Systems administration
article thumbnail

AIIM's Information Management Training - Cost, Options, and FAQs

AIIM

For the most part, I’ve stayed away from blogging about AIIM's training for two reasons. First, we wanted these blog posts to be informative and insightful, rather than be perceived as self-aggrandizement. Courses include: Emerging Technologies: AI, Blockchain, Cloud, and Robotic Process Automation. Introduction to ERM.

ECM 116
article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

Krebs wrote for The Washington Post between 1995 and 2009 before launching his current blog KrebsOnSecurity.com. His 1994 book detailing cryptographic algorithms ( Applied Cryptography ) was just the beginning of his contributions to technical perspectives on system design, cybersecurity, privacy, and more. Dave Kennedy | @hackingdave.

article thumbnail

Data Protection in the Digital Transformation Era

Thales Cloud Protection & Licensing

As highlighted in the 2019 Thales Data Threat Report , an increasing number of organizations across the globe are now using sensitive data on digitally transformative technologies like cloud, virtualization, big data, IoT, blockchain, etc. The second layer of the stack covers system-level protection controls.