Remove Case Study Remove Education Remove Libraries Remove Security
article thumbnail

e-Records 2019: Early Bird discount expires soon!

The Texas Record

Better Together in a Digital World: Security and Retention. On November 15, the Texas State Library and Archives Commission and the Texas Department of Information Resources will bring together speakers to share case studies and presentations to help Texas governments achieve the benefits of digital transformation and overcome its challenges.

article thumbnail

Survey reports skills in technology and Digital Preservation will be most desired in the next five years

Preservica

From the digitization of records and data management to preservation and secure public access and discovery of files — archival repositories must evolve and keep pace with technology to continue serving its users. See our exciting, new innovations in action during our live demo webinar on Tuesday, March 7.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Working internationally

CILIP

John Dolan and Ayub Khan have long shared an interest in the international library scene and how different countries and cultures can share and benefit from each other. Our involvement started when we answered a British Council advertisement, in October 2014, for help with reinstating libraries in Lahore and Karachi, Pakistan.

article thumbnail

Establishing Records Management at Brandeis—The First Eighteen Months

Brandeis Records Manager

These ranged from one-on-ones to a surprise fifty-person audience of administrators for an entire school (my meeting invitation indicated eight people attending, and I walked into a function hall—should have cased the joint). We made early acquaintances with Legal and Information Security leaders. It’s about points of view.

article thumbnail

The Hacker Mind Podcast: The Internet As A Pen Test

ForAllSecure

A lot of SMBs do not have security operations centers or SOCs. They have IT contractors who can provision laptops and maintain a certain level of compliance and security. They can provide that additional security, remotely. They have those security capabilities. In a way and then you consume the outcomes.

article thumbnail

Types of Malware & Best Malware Protection Practices

eSecurity Planet

Rogue security software. Architect a premium network security model like SASE that encompasses SD-WAN , CASB , secure web gateways , ZTNA , FWaaS , and microsegmentation. Ensure you install and run anti-malware software on your system and maintain high-security settings for browser activity. Jump ahead: Adware.

Phishing 104
article thumbnail

Tokyo 2020: when a sprint turned into a marathon

CILIP

And, from a blank sheet of paper, a safe and secure way found of hosting the world?s And then we promote the learning opportunities, including a lot of social learning, executive education and experiential observation opportunities. All the venue agreements to be renegotiated. All the plans redrawn. s biggest sporting event ?