article thumbnail

Career Choice Tip: Cybercrime is Mostly Boring

Krebs on Security

” The researchers drew on interviews with people engaged in such enterprises, case studies on ex- or reformed criminal hackers, and from scraping posts by denizens of underground forums and chat channels. ’ So he quit and began to focus on something he enjoyed far more: perfecting his own malware.”

article thumbnail

Summary – “Blockchain Technology and Recordkeeping”

ARMA International

Additionally, the article is included in Information Management Magazine, ARMA-AIEF Special Edition , which will be available for download in November. This article summarizes a report published by AIEF on May 30, 2019. A printed version of the special issue will be available as well, for a nominal fee. The full report is available at [link].

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A short history of intranets and what's next with social, mobile and cloud

ChiefTech

However, they had no intention of implementing any kind of sophisticated security or access control system. One of the earliest intranet case studies was actually written by Jakob Nielsen and Darrel Sano in 1994 about their approach to designing Sun Microsystems' intranet - and yes, one of the methods was card sorting !

Cloud 89
article thumbnail

A short history of intranets and what next with social, mobile and cloud

ChiefTech

However, they had no intention of implementing any kind of sophisticated security or access control system. One of the earliest intranet case studies was actually written by Jakob Nielsen and Darrel Sano in 1994 about their approach to designing Sun Microsystems' intranet - and yes, one of the methods was card sorting !

Cloud 40