Remove 12
article thumbnail

Blockchain Part of Sphereon’s Content Services Suite

Info Source

For a few years now, Harvey Spencer Associates has been promoting blockchain as a natural extension of capture technology. The Harvard Business Review describes blockchain as “an open, distributed ledger that can record transactions between two parties efficiently and in a verifiable and permanent way.”

article thumbnail

Riding the blockchain wave in trade finance

CGI

Riding the blockchain wave in trade finance. Mon, 12/12/2016 - 22:35. It also can easily run afoul of constantly changing government regulations. Trade finance is ripe for innovation, and many observers believe that blockchain technology is the key to transforming global trade. ravi.kumarv@cgi.com.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

Some technology trends such as real-time data analytics are on-going, while others are more recent, such as blockchain. ARMA defines information as “Data that has been given value through analysis, interpretation, or compilation in a meaningful form” (ARMA 2016, p 28). Blockchain, Provenance, and Authentic Information.

article thumbnail

Weekly podcast: Uber, Tether, Bitcoin and Western Union

IT Governance

This week, we discuss Uber’s cover-up of a 2016 breach that compromised 57 million drivers’ and customers’ personal information, the theft of almost $31 million worth of USDT and more than €100,000 worth of Bitcoin, and good news for victims of Western Union transfer scams. Well, that’ll do for this week.

article thumbnail

Encryption: How It Works, Types, and the Quantum Future

eSecurity Planet

Through public and commercial development of advanced encryption methods, organizations from sensitive government agencies to enterprise companies can ensure protected communications between personnel, devices, and global offices. In 2016, only 40% of websites protected their web pages and visiting users with HTTPS.

article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

Starting with her first desktop on a Unix machine at age 12, Eva Galperin’s contributions to cybersecurity include research on malware and privacy. If the US government dictating iPhone encryption design sounds ok to you, ask yourself how you'll feel when China demands the same. Eva Galperi n | @evacide.

article thumbnail

An Approach to Cybersecurity Risk Oversight for Corporate Directors

Data Matters

Increasingly, thought leaders, professional organizations, and government agencies are beginning to provide answers. Creating an enterprise-wide governance structure. Creating an Enterprise-Wide Governance Structure. Aligning cyber risk with corporate strategy.