LiveJournal Blog Platform Credential Leak: What Happened?

Data Breach Today

Millions of Older Credentials Apparently Used in Credential-Stuffing Attacks The Russian blogging platform LiveJournal confirmed this week that it suffered several brute-force attacks in 2011 and 2012.

Sales 165

Revving up the AMC Technical Blogs

Micro Focus

Now, as Derek Britton reveals, we’ve put all the latest AMC practitioner blogs in a single location. With so much valuable technology available from our modernization solution, we’re often asked to provide greater insights.

108
108

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

COBOL Survey Results Webinar Recap | #COBOL60 Blog

Micro Focus

Introduction If you missed last week’s COBOL survey results webinar, can catch up on all the important highlights, key stats and expert commentary by viewing the recording available here. If you were able to attend – THANK YOU for participation and supportive commentary throughout the broadcast.

88

Ghost Blogging Platform Hacked To Mine Cryptocurrency

Adam Levin

Hackers successfully breached the servers of a popular blogging platform and used them to mine cryptocurrency. Ghost, a Singapore-based blogging platform with 2,000,000 installations and 750,000 active users, announced that hackers had breached their systems. .

Cryptolocking WordPress Plugin Locks Up Blog Posts

Threatpost

A new type of malicious plugin has been spotted in the wild with the capability of targeting individual blog posts. Cryptography Malware Web Security blog posts cryptolocking Encryption malicious plugin malware Sucuri wordpress wpsecurity

The most-read OpenText blogs of 2018

OpenText Information Management

As 2018 ends and the New Year begins, we’re reflecting on the most-read OpenText™ blogs of the year. Break boundaries and redefine normal at the OpenText Women … The post The most-read OpenText blogs of 2018 appeared first on OpenText Blogs.

CMS 55

DPO Research Blog

Managing Your Information

The post DPO Research Blog appeared first on Managing Your Information. Tkm's Data Protection Blog data protection DPO researchI have been busy over the last month or so trying to get ideas for my PhD research that is looking at the role of the Data Protection Officer. If you are interested, please pop over to our dedicated research site.

IT 28

AMC Track Universe Report Blog

Micro Focus

Introduction Vienna, one of Europe’s most beautiful, historically important cities, proved to be the perfect location for a fantastic customer forum centred on application modernization. Part of the Micro Focus Universe show, our single biggest industry event of the year, the Application Modernization and Connectivity Customer Forum at the Austria Centre, Vienna, March 26-28, attracted. View Article.

68

Love Our Blog? The Blog Loves You Too!: eDiscovery Love Story

eDiscovery Daily

But, this is an eDiscovery blog, so let me take this opportunity to “spread some love” to all of you who read the blog every day (or at least many days) and help spread that love to others! We’ve seen quite a few blogs come and go during that time (or at least go dormant).

Top 7 Data Governance and Metadata Management Blog Posts of 2019

erwin

To help you prepare for 2020, we’ve compiled some of the most popular data governance and metadata management blog posts from the erwin Experts from this year. The Best Data Governance and Metadata Management Blog Posts of 2019. erwin Expert Blog data governance metadata management

RSA 2019 Blog Series: Securing Microservices

Thales eSecurity

Among the topics I will address at RSA and in this series of blog posts include: What questions should security professionals be asking about microservices? The post RSA 2019 Blog Series: Securing Microservices appeared first on Data Security Blog | Thales eSecurity.

Guest Blog: Kay Steed, State Agency RMO

The Texas Record

We are excited to launch a new blog series featuring records management personnel in Texas sharing their experiences in the field. Tips guest blog records management officer RMO State Agencies

To Live and Love in the Time of Corona

OpenText Information Management

Humanity is at a critical juncture, and our individual decisions will decide between life or death, recession or … The post To Live and Love in the Time of Corona appeared first on OpenText Blogs. CEO Blog mark barrenechea CEO blog coronavirus Covid-19 COVID corona

108
108

Top 7 Data Governance Blog Posts of 2018

erwin

With that in mind, we’ve compiled a list of the very best, best-practice blog posts from the erwin Experts in 2018. www.erwin.com/blog/defining-data-governance/. www.erwin.com/blog/top-6-benefits-of-data-governance/. www.erwin.com/blog/data-governance-readiness/.

Attackers Exploit SaltStack Flaws to Compromise Open Source OS & Blogging Platform

Dark Reading

Intruders gained access to core systems at the Android-based LineageOS project and the Ghost platform

Best of TAB 2017 part 2: the top blog posts

TAB OnRecord

It is time for part two of our series on the top RIM resources of the past year, including your favorite case studies, white papers, blog posts and guides. The post Best of TAB 2017 part 2: the top blog posts appeared first on TAB Records Management Blog | TAB OnRecord.

Resuming the blog

Data Protector

Time to start blogging again

31

Time to Act

OpenText Information Management

For Black Americans: The unemployment rate has doubled to near 17% The death rate from COVID-19 is 3x the rate of white people 25% cannot … The post Time to Act appeared first on OpenText Blogs. CEO Blog OpenText mark barrenechea CEO blog Black Lives Matter George Floyd

64

Best of Record Nations 2018: Top 15 Blogs

Record Nations

The following blog posts were the most popular in 2018. Records Management Compliance Three of our top blogs help you know the regulations for keeping records. The post Best of Record Nations 2018: Top 15 Blogs appeared first on Record Nations.

Guest Blog: End-to-End Data Encryption with Data Reduction from Thales & Pure Storage

Thales eSecurity

The post Guest Blog: End-to-End Data Encryption with Data Reduction from Thales & Pure Storage appeared first on Data Security Blog | Thales eSecurity.

NT Analyzer Blog Series: Why So Many Cookie Policies Are Broken, Part I – HTML5 LocalStorage

Data Protection Report

Compliance and risk management Data breach NT Analyzer Blog Series NT Analyzer blog series PrivacyCookies Are One Piece of a Larger Puzzle.

Top Ten Blog Articles of 2019

Synergis Software

In 2019, here are the blog posts that you found to be the most valuable: #10: 3D Printing Dives into Serial Manufacturing Production. He has been a guest contributor to the Synergis Adept blog since 2014. The post Top Ten Blog Articles of 2019 appeared first on Synergis Software Blog Throughout the year Synergis Software shares how Adept users find strategic value in the product, and to improve your existing Adept installation.

Record Retention a key component of privacy and cyber compliance program via bn blogs.

IG Guru

The post Record Retention a key component of privacy and cyber compliance program via bn blogs.

Cybersecurity Awareness Month Blog Series: Alright boys, it’s time we have “The Talk”

Thales eSecurity

Please be sure to read our CEO Cindy Provin’s recent blog for some good resources. The post Cybersecurity Awareness Month Blog Series: Alright boys, it’s time we have “The Talk” appeared first on Data Security Blog | Thales eSecurity.

Blog Post: Saudi Vision 2030

Schneier on Security

By David Gurteen I've just spent a few days in Riyadh where I gave a talk and run a Knowledge Café as part of a KM Forum entitled "Knowledge Management Utilization in Realizing Saudi Vision 2030" organized by the Naseej Academy. Saudi Vision 2030 is a plan to reduce Saudi Arabia's dependence on oil, diversify its economy, and develop public service sectors such as health, education, infrastructure, recreation, and tourism.

Guest Blog: Why it’s Critical to Orchestrate PKI Keys for IoT

Thales eSecurity

The post Guest Blog: Why it’s Critical to Orchestrate PKI Keys for IoT appeared first on Data Security Blog | Thales eSecurity. According to statistica the number of Internet of Things (IoT) devices connected will rise to 23 billion this year.

IoT 87

Audio Blog: What is Identity?

Architect Security

Today on the blog, we discuss: What is Identity? Find out more at my sister-site, IncreaseYourSecurity.org. Personal Security Privacy Social Media

GUEST ESSAY: What everyone should know about the pros and cons of online fingerprinting

The Last Watchdog

For consumers Guest Blog Post Privacy Top StoriesWhen it was first introduced, device fingerprinting – or online fingerprinting in general – was meant to create a safer, more responsible internet.

GDPR 173

Blog Recap: The Web Data Extraction Articles You Liked Most in 2018

Connotate

As 2018 is coming to a close, we at Connotate are looking back at the blog posts we published this year to see which ones you responded to the most.

63

Cybersecurity Awareness Month Blog Series: It’s Cybersecurity Awareness Month – advice to SMBs

Thales eSecurity

The post Cybersecurity Awareness Month Blog Series: It’s Cybersecurity Awareness Month – advice to SMBs appeared first on Data Security Blog | Thales eSecurity. This October marks the 15 th year of Cybersecurity Awareness Month.

International Women’s Day 2020: Each for Equal

OpenText Information Management

It is a day to recognize the significant strides we have made so far and look forward with the resolve that we can … The post International Women’s Day 2020: Each for Equal appeared first on OpenText Blogs. “Every individual matters. Every individual has a role to play.

IT 91

Privacy Blog Ranked as One of Best Legal Blogs

Hunton Privacy

Hunton & Williams LLP is proud to announce our Privacy & Information Security Law Blog has been named the top Cybersecurity and Information Privacy blog by The Expert Institute and #2 overall Best AmLaw Blog of 2016. All of our lawyers and contributors thank you for your support in making the blog a success. Judges noted that the “privacy blog influences global privacy and data security developments.”.

Cybersecurity Awareness Month Blog Series: Leading the cybersecurity jobs of the future

Thales eSecurity

Visit this page to subscribe to our newsletter to receive the latest data security research, insights from our blogs and other resources. The post Cybersecurity Awareness Month Blog Series: Leading the cybersecurity jobs of the future appeared first on Data Security Blog | Thales eSecurity.

Privacy Blog Nominated for Best AmLaw Blog of 2018 – Please Vote to Win

Hunton Privacy

Hunton Andrews Kurth’s Privacy & Information Security Law Blog has been nominated in The Expert Institute’s 2018 Best Legal Blog Contest for Best AmLaw Blog of 2018. For nearly 10 years, our award-winning privacy blog has provided readers with current information and legal commentary on news stories; breaking international, federal and state legislation; and other issues on privacy, data protection and cybersecurity.

IG GURU makes “Top 15 Dark Web Blogs and Websites To Follow in 2019” via Feedspot

IG Guru

This is the most comprehensive list of Top 15 Dark Web Blogs on the internet and I’m honored to have you as part […]. The post IG GURU makes “Top 15 Dark Web Blogs and Websites To Follow in 2019” via Feedspot appeared first on IG GURU.

Cybersecurity Awareness Month Blog Series: Using Technology to Safeguard the Nation’s Critical Infrastructure

Thales eSecurity

In this blog post, I’ll discuss: Our current perimeter defense; The need to shift to a data-centric security approach; and, The need to educate the public to strengthen our critical infrastructure security posture.

Guest Blog: End-to-End Data Encryption with Data Reduction from Thales & Pure Storage

Thales eSecurity

The post Guest Blog: End-to-End Data Encryption with Data Reduction from Thales & Pure Storage appeared first on Data Security Blog | Thales eSecurity.

The Information Opportunity

OpenText Information Management

By next year, humans will have accumulated around … The post The Information Opportunity appeared first on OpenText Blogs. CEO Blog OpenText mark barrenechea CEO blog Information AdvantageThe Digital Era is over. We have entered the Information Era.

75

This Blog Post Will Not Be Automatically Deleted, But Your Instant Message Might Be: eDiscovery Trends

eDiscovery Daily

Sponsor: This blog is sponsored by CloudNine , which is a data and legal discovery technology company with proven expertise in simplifying and automating the discovery of data for audits, investigations, and litigation.

RSAC 2019 Blog Series: Taking the Risk out of Digital Transformation: RSAC 2019’s Quest for Delivering “Better”

Thales eSecurity

You can also check back in on the blog, as my colleagues will be writing about RSA-related topics during and after the show. Amid all of the movement, news and excitement during the past year, it is time again for our industry to gather at RSA.