Remove tag right-to-privacy-2
article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

Part 2 will discuss the critical factors for a successful DT journey, because organizations need to do a “mind-shift” from traditional records and information management (RIM) practices to content services (CS). This part will also discuss managing CS risks such as ransomware, privacy, change management, and user adoption.

article thumbnail

Is India's Aadhaar System Really "Hack-Proof"? Assessing a Publicly Observable Security Posture

Troy Hunt

But there's been one claim more than any other that's really caught my eye, and it's this one: Troy, meet @UIDAI and @NandanNilekani. It's operating in an era of increasingly large repositories of personal data held by both private companies and governments alike. Sooner or later, big repositories of data will be abused. Of course it can!

Security 111