Remove Computer and Electronics Remove Conference Remove Libraries Remove Security
article thumbnail

Supply-Chain Attack against the Electron Development Platform

Schneier on Security

Electron is a cross-platform development system for many popular communications apps, including Skype, Slack, and WhatsApp. Security vulnerabilities in the update system allows someone to silently inject malicious code into applications. Basically, the Electron ASAR files aren't signed or encrypted, so modifying them is easy.

article thumbnail

Building the Relationship Between RM and IT

The Texas Record

Whether it’s creating and securing electronic records or establishing a process to capture records from social media sites, records managers often find themselves working closely with their Information Technology (IT) Departments. We would also invite them to RM conferences. This helped both teams to better communicate.

IT 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Hacking Charity

ForAllSecure

This office had sort of crawled to a halt, because they were processing kids that had lost their parents and they were trying to find profiles and sponsors for them, sponsors that pay for their schooling and all that stuff, and their network, their computers were so screwed up that they had to like stop. You might not know any real hackers.

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

This means imaging the “art of the possible” for a new future using a cloud computing model to deliver transformative change. Gartner (2021) has two related definitions: Digital Transformation: “can refer to anything from IT modernization (for example, cloud computing), to digital optimization, to the invention of new digital business models.”

article thumbnail

Part 2: OMG! Not another digital transformation article! Is it about the evolution from RIM to Content Services?

ARMA International

This means imagining the “art of the possible” for a new future using a cloud computing model to deliver transformative change. How will organizations use so-called “vaccine passports” related to employees and customers and how will organizations secure their protected health information (PHI) in response to changing health directives?

article thumbnail

Chronicle of a Records Manager: Controlling the Chaos of Disaster Response and Recovery

ARMA International

I have overseen two significant projects: an electronic discovery production and disaster response and recovery effort. These floors contain offices, a record center, a library and researcher area, a processing area, and the archives. Covering all computers and file cabinets in plastic sheeting. . Hurricane Ida Preparations.

article thumbnail

e-Records 2017: “Teacher Retirement System of Texas: The Information Governance Journey”

The Texas Record

This is the seventh post of a multi-part recap of the 2017 e-Records Conference. Presentation materials from the conference are available on the e-Records 2017 website. TSLAC Wants Your Electronic Records. Big Data vs. Information Security: Bringing Peace to Conflict. Information Governance: Take Control and Succeed.