Guest Blog: Preparedness Awareness

The Texas Record

Tips and Topics disposition disposition log guest blog ISD local governments policeContributing Author: Normel Chatmon Records Analyst Fort Bend ISD Police Department. September is National Preparedness Month.

LiveJournal Blog Platform Credential Leak: What Happened?

Data Breach Today

Millions of Older Credentials Apparently Used in Credential-Stuffing Attacks The Russian blogging platform LiveJournal confirmed this week that it suffered several brute-force attacks in 2011 and 2012. But it insists that the 26 million usernames and passwords that are now available for sale on darknet forums came from other sources

Sales 126
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Phil Venables Blogging

Adam Shostack

Phil Venables is one of the more reflective and thoughtful CSOs out there, and in this era where everything is a tweet or a linkedin post (sigh) you may have missed that Phil has a blog. blogs & podcastsThis Labor day, why not take the time to catch up on his writing?

40

Revving up the AMC Technical Blogs

Micro Focus

Now, as Derek Britton reveals, we’ve put all the latest AMC practitioner blogs in a single location. With so much valuable technology available from our modernization solution, we’re often asked to provide greater insights. Read on… By now regular readers will have no doubt that Micro Focus AMC technology is the leading way to drive. View Article.

84

AMC Track Universe Report Blog

Micro Focus

Introduction Vienna, one of Europe’s most beautiful, historically important cities, proved to be the perfect location for a fantastic customer forum centred on application modernization. Part of the Micro Focus Universe show, our single biggest industry event of the year, the Application Modernization and Connectivity Customer Forum at the Austria Centre, Vienna, March 26-28, attracted. View Article.

72

Data Management Systems: Catalyst to a Better Customer Experience via Data Entry Outsourced Blog

IG Guru

The post Data Management Systems: Catalyst to a Better Customer Experience via Data Entry Outsourced Blog appeared first on IG GURU. Business IG News Infonomics Information Governance Data Entry Data Entry Outsourced Blog Data Governance Data ManagementCheck out the post here.

DPO Research Blog

Managing Your Information

The post DPO Research Blog appeared first on Managing Your Information. Tkm's Data Protection Blog data protection DPO researchI have been busy over the last month or so trying to get ideas for my PhD research that is looking at the role of the Data Protection Officer. If you are interested, please pop over to our dedicated research site.

IT 28

Our Blog is Moving!

HL Chronicle of Data Protection

To our valued readers of the Chronicle of Data Protection blog: we are changing how we deliver our content. As of today, we have moved the blog to a new technology platform: Hogan Lovells Engage. Also, we will continue to send emails about new blog posts to current email subscribers of the blog. We are working to make this transition as seamless as possible.

COBOL Survey Results Webinar Recap | #COBOL60 Blog

Micro Focus

Introduction If you missed last week’s COBOL survey results webinar, can catch up on all the important highlights, key stats and expert commentary by viewing the recording available here. If you were able to attend – THANK YOU for participation and supportive commentary throughout the broadcast. For those that are still catching up, let’s just. View Article. Application Modernization and Connectivity COBOL Enterprise Applications Modernization Visual COBOL

68

Cryptolocking WordPress Plugin Locks Up Blog Posts

Threatpost

A new type of malicious plugin has been spotted in the wild with the capability of targeting individual blog posts. Cryptography Malware Web Security blog posts cryptolocking Encryption malicious plugin malware Sucuri wordpress wpsecurity

SecurityAffairs awarded as Best European Cybersecurity Technical Blog

Security Affairs

I’m proud to announce that SecurityAffairs was awarded as Best European Cybersecurity Technical Blog at European Cybersecurity Blogger Awards. The post SecurityAffairs awarded as Best European Cybersecurity Technical Blog appeared first on Security Affairs. The winners of the annual European Cybersecurity Blogger Awards have been announced.

The most-read OpenText blogs of 2018

OpenText Information Management

As 2018 ends and the New Year begins, we’re reflecting on the most-read OpenText™ blogs of the year. Break boundaries and redefine normal at the OpenText Women … The post The most-read OpenText blogs of 2018 appeared first on OpenText Blogs. From diversity in technology to moving above the cloud to enabling the intelligent and connected enterprise, here are the 10 stories that caught your attention in 2018.

CMS 43

Ghost Blogging Platform Hacked To Mine Cryptocurrency

Adam Levin

Hackers successfully breached the servers of a popular blogging platform and used them to mine cryptocurrency. Ghost, a Singapore-based blogging platform with 2,000,000 installations and 750,000 active users, announced that hackers had breached their systems. . The post Ghost Blogging Platform Hacked To Mine Cryptocurrency appeared first on Adam Levin.

Guest blog: CDO Summer School – A look back

Collibra

The post Guest blog: CDO Summer School – A look back appeared first on Collibra What makes a learning experience useful, pivotal or even, to use an 80’s expression, paradigm-shifting? In other words, what makes learning groundbreaking enough to make you rethink how you do things?

Love Our Blog? The Blog Loves You Too!: eDiscovery Love Story

eDiscovery Daily

But, this is an eDiscovery blog, so let me take this opportunity to “spread some love” to all of you who read the blog every day (or at least many days) and help spread that love to others! When we started the blog nearly ten years ago, we were thrilled when we broke 100 views for the first time. We’ve seen quite a few blogs come and go during that time (or at least go dormant). and Sharon Nelson’s Ride the Lightning blog, and the ACEDS blog , among others.

Hackers are scanning the internet for vulnerable Salt installs, Ghost blogging platform hacked

Security Affairs

Hackers are conducting a mass-scanning the Internet for vulnerable Salt installs that could allow them to hack the organizations, the last victim is the Ghost blogging platform. Experts warn of hacking campaign that is targeting organization using the Salt platform for the management of their infrastructure, the last victim is the Ghost blogging platform. based blogging platform Ghost suffered a similar incident.

Guest Blog: Kay Steed, State Agency RMO

The Texas Record

We are excited to launch a new blog series featuring records management personnel in Texas sharing their experiences in the field. Tips guest blog records management officer RMO State AgenciesLet us know if you would like to share your words of wisdom (or humor!) here on The Texas Record and be our next guest blogger. Our first guest blogger is Kay Steed, CRM, Records Management Officer at Employees Retirement System of Texas. How did you get involved with Records Management?

RSA 2019 Blog Series: Securing Microservices

Thales eSecurity

Among the topics I will address at RSA and in this series of blog posts include: What questions should security professionals be asking about microservices? Please join me at RSA on Tuesday, March 5 at 10:20 am in the North Briefing Center and watch for additional blog posts in which I will expand on the topics above. The post RSA 2019 Blog Series: Securing Microservices appeared first on Data Security Blog | Thales eSecurity.

Top 7 Data Governance and Metadata Management Blog Posts of 2019

erwin

To help you prepare for 2020, we’ve compiled some of the most popular data governance and metadata management blog posts from the erwin Experts from this year. The Best Data Governance and Metadata Management Blog Posts of 2019. In this metadata management blog, the erwin Experts assess four use cases that demonstrate exactly how metadata-driven automation increases productivity: Four Use Cases Proving the Benefits of Metadata-Driven Automation.

Top 7 Data Governance Blog Posts of 2018

erwin

With that in mind, we’ve compiled a list of the very best, best-practice blog posts from the erwin Experts in 2018. www.erwin.com/blog/defining-data-governance/. www.erwin.com/blog/top-6-benefits-of-data-governance/. www.erwin.com/blog/data-governance-readiness/. www.erwin.com/blog/data-governance-and-gdpr/. www.erwin.com/blog/data-governance-use-cases/. www.erwin.com/blog/data-governance-2-0-financial-services/.

Announcing the Journey to AI Blog, the new home for IBM data and AI stories

IBM Big Data Hub

Welcome to the Journey to AI Blog , the new home for blog storytelling from across the IBM Data and AI business. Here you’ll find the latest news, client features, product launches, industry innovator spotlights and thought leadership from IBM executives

52

friday art blog: Terry Frost

Archives Blogs

Black and Red on Blue (Screenprint, A/P, 1968). Born in Leamington Spa, Warwickshire, in 1915, Terry Frost KBE RA did not become an artist until he was in his 30s. During World War II, he served in France, the Middle East and Greece, before joining the commandos.

32

Microsoft Talks Schrems II and Assuring Customers About Cross-Border Data Flows via Microsoft Blog

IG Guru

The post Microsoft Talks Schrems II and Assuring Customers About Cross-Border Data Flows via Microsoft Blog appeared first on IG GURU. Microsoft official statement on Schrems II and its cloud services.

Cloud 56

OpenText funds 4 million meals this holiday season

OpenText Information Management

CEO Blog OpenText Life CSR mark barrenechea CEO blog OpenText Voyager Voyager Fund2020 has been a most challenging year, and food insecurity has dramatically increased over the last year globally.

A Change in Tempo? eDiscovery Operational Metrics in the Summer of 2020 via ACEDS Blog

IG Guru

eDiscovery Operational Metrics in the Summer of 2020 via ACEDS Blog appeared first on IG GURU. Check out the post here. The post A Change in Tempo? ACEDS Business eDiscovery Information Governance Metrics Rob Robinson

Blog Post: Saudi Vision 2030

Schneier on Security

By David Gurteen I've just spent a few days in Riyadh where I gave a talk and run a Knowledge Café as part of a KM Forum entitled "Knowledge Management Utilization in Realizing Saudi Vision 2030" organized by the Naseej Academy. Saudi Vision 2030 is a plan to reduce Saudi Arabia's dependence on oil, diversify its economy, and develop public service sectors such as health, education, infrastructure, recreation, and tourism.

Best of TAB 2017 part 2: the top blog posts

TAB OnRecord

It is time for part two of our series on the top RIM resources of the past year, including your favorite case studies, white papers, blog posts and guides. In this installment, we share the top three blog posts of 2017: how to save money with RIM, corporate moves, and document imaging for financial institutions. [.] The post Best of TAB 2017 part 2: the top blog posts appeared first on TAB Records Management Blog | TAB OnRecord.

Micro Focus Blog Post Rocking the Net Promoter?. STILL.

Micro Focus

Latest Net Promoter® Score Results Today, I’m going to take a look at the latest Micro Focus Net Promoter® Score (NPS) Competitive Benchmark Results. (a) a) NPS Results We run our competitive benchmark program quarterly using rolling data. In the latest dataset, which I highlight is double-blind and contains a very large sample size of over 15,000. View Article. Company Culture Corporate Client Satisfaction Customer Satisfaction Micro Focus Net Promoter® Score Net Promoter Score NPS

40

Audio Blog: What is Identity?

Architect Security

Today on the blog, we discuss: What is Identity? Find out more at my sister-site, IncreaseYourSecurity.org. Personal Security Privacy Social Media

Resuming the blog

Data Protector

Time to start blogging again

24

Top Ten Blog Articles of 2019

Synergis Software

In 2019, here are the blog posts that you found to be the most valuable: #10: 3D Printing Dives into Serial Manufacturing Production. He has been a guest contributor to the Synergis Adept blog since 2014. The post Top Ten Blog Articles of 2019 appeared first on Synergis Software Blog Throughout the year Synergis Software shares how Adept users find strategic value in the product, and to improve your existing Adept installation.

Top 10 IBM Big Data & Analytics Hub blog posts of 2017

IBM Big Data Hub

They voraciously read blog posts about incorporating machine learning, choosing the best possible data model, determining how to make the most of data science skills, working with open source frameworks and more. Here are our top 10 blog posts of 2017 Readers of the IBM Big Data & Analytics Hub were hungry for knowledge this year.

friday art blog: kate downie

Archives Blogs

Nanbei by Kate Downie (Oil on canvas, 2013). During a series of visits to China a few years ago, Kate Downie was brought into contact with traditional ink painting techniques, and also with the China of today.

IT 26

Best of Record Nations 2018: Top 15 Blogs

Record Nations

The following blog posts were the most popular in 2018. Records Management Compliance Three of our top blogs help you know the regulations for keeping records. The post Best of Record Nations 2018: Top 15 Blogs appeared first on Record Nations. Throughout 2018, records management has become increasingly important as companies work to become more efficient. Managing Record Retention Requirements in the Office Don’t be confused by record retention requirements. […].

Privacy Blog Ranked as One of Best Legal Blogs

Hunton Privacy

Hunton & Williams LLP is proud to announce our Privacy & Information Security Law Blog has been named the top Cybersecurity and Information Privacy blog by The Expert Institute and #2 overall Best AmLaw Blog of 2016. All of our lawyers and contributors thank you for your support in making the blog a success. Judges noted that the “privacy blog influences global privacy and data security developments.”.

Guest Blog: End-to-End Data Encryption with Data Reduction from Thales & Pure Storage

Thales eSecurity

The post Guest Blog: End-to-End Data Encryption with Data Reduction from Thales & Pure Storage appeared first on Data Security Blog | Thales eSecurity. At the 2019 RSA Conference, Pure Storage and Thales introduced Vormetric Transparent Encryption for Efficient Storage – the IT and security industries’ first end-to-end data encryption framework that realizes storage array data reduction.

Privacy Blog Nominated for Best AmLaw Blog of 2018 – Please Vote to Win

Hunton Privacy

Hunton Andrews Kurth’s Privacy & Information Security Law Blog has been nominated in The Expert Institute’s 2018 Best Legal Blog Contest for Best AmLaw Blog of 2018. For nearly 10 years, our award-winning privacy blog has provided readers with current information and legal commentary on news stories; breaking international, federal and state legislation; and other issues on privacy, data protection and cybersecurity.

NT Analyzer Blog Series: Why So Many Cookie Policies Are Broken, Part I – HTML5 LocalStorage

Data Protection Report

Compliance and risk management Data breach NT Analyzer Blog Series NT Analyzer blog series PrivacyCookies Are One Piece of a Larger Puzzle. There has been an odd preoccupation with cookies for some time now—to the exclusion of other forms of browser tracking, some of which are much more flexible and more robust in their data collection capabilities than cookies.

GUEST ESSAY: 5 steps for raising cyber smart children — who know how to guard their privacy

The Last Watchdog

Best Practices For consumers Guest Blog Post Privacy Top StoriesToday’s children are online at a young age, for many hours, and in more ways than ever before. As adults, we know that bad online decisions can have negative or dangerous effects for years to come. Related: Web apps are being used to radicalize youth.

Cybersecurity Awareness Month Blog Series: Alright boys, it’s time we have “The Talk”

Thales eSecurity

Please be sure to read our CEO Cindy Provin’s recent blog for some good resources. The post Cybersecurity Awareness Month Blog Series: Alright boys, it’s time we have “The Talk” appeared first on Data Security Blog | Thales eSecurity. As a father of two teenage boys, I should have seen this coming. It was time to have the talk about the right, wrong, and applying good judgement of things found on the Web.