article thumbnail

AIIM's Information Management Training - Cost, Options, and FAQs

AIIM

For the most part, I’ve stayed away from blogging about AIIM's training for two reasons. First, we wanted these blog posts to be informative and insightful, rather than be perceived as self-aggrandizement. Courses include: Emerging Technologies: AI, Blockchain, Cloud, and Robotic Process Automation. Introduction to ERM.

ECM 116
article thumbnail

Data Protection in the Digital Transformation Era

Thales Cloud Protection & Licensing

As highlighted in the 2019 Thales Data Threat Report , an increasing number of organizations across the globe are now using sensitive data on digitally transformative technologies like cloud, virtualization, big data, IoT, blockchain, etc. The second layer of the stack covers system-level protection controls.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Stealing computing power: A growing trend in cyber crime that can target all Internet-connected devices

CGI

See our related blog, “ Not all blockchains are created equal when it comes to energy consumption.”) Using another organization’s computer capacity might seem harmless, but the decreased power (as much as 65%) slows down workstations and systems, and quickly can cause significant losses. Is it just one device or a whole system?

Mining 74
article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

Krebs wrote for The Washington Post between 1995 and 2009 before launching his current blog KrebsOnSecurity.com. His 1994 book detailing cryptographic algorithms ( Applied Cryptography ) was just the beginning of his contributions to technical perspectives on system design, cybersecurity, privacy, and more. Dave Kennedy | @hackingdave.