Remove Course Remove Digital transformation Remove Government Remove Libraries
article thumbnail

MY TAKE: Poorly protected local government networks cast shadow on midterm elections

The Last Watchdog

It’s easy to think of it as a problem the federal government must address or something that enterprises deal with, but cybersecurity has to be addressed closer to home, as well. His company supplies a co-managed SIEM service to mid-sized and large enterprises, including local government agencies. I spoke to A.N. Election threat.

article thumbnail

How Much Does Records Management Training Cost? Options For Any Budget

AIIM

Those looking for training should be sure to also check out options available through college courses, online training providers, etc. If you’re looking for a thorough understanding of Records Management, regardless of budget, then you might be interested in AIIM's full Records Management training course.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

Now information technologies and the information revolution are again transforming society. The COVID-19 pandemic further accelerated the transformation from many years to just a couple of years. This 3-part series will discuss digital transformation (DT) from several perspectives. The Genesis of Digital Transformation.

article thumbnail

[Podcast] Artificial Intelligence Training for Information Professionals

AIIM

Which is why AIIM teamed up with Emerging Technology expert Alan Pelz-Sharpe to design a training course around the use of AI for information management. The result was AIIM's Emerging Technology course on Artificial Intelligence. Click here to access our full library of episodes. Want more episodes like this?

article thumbnail

Gartner Security & Risk Management Summit 2018 Trip Report

Thales Cloud Protection & Licensing

I was just reviewing last year’s trip report and thinking about how it was full of “IoT”, “Blockchain”, and of courseDigital Transformation”. An example they shared was timely, “the Inclusion of malware in organization code via malware injection in code library”. The keyboard of course!

Risk 59
article thumbnail

MY TAKE: Memory hacking arises as a go-to tactic to carry out deep, persistent incursions

The Last Watchdog

For instance, major vulnerability was discovered lurking in the GNU C Library, or GLIBC, an open source component that runs deep inside of Linux operating systems used widely in enterprise settings. A network breach begins, of course, with an incursion. Manipulating runtime. This quickly gets intricately technical.

article thumbnail

Mine, Mine, All Mine

John Battelle's Searchblog

Just like my ripped CDs, my first digital photos, and my recordings, those early digital footprints have been erased by the tides of platform change. If they change course, or – perish the thought – if they fail, well, what then? It was our job to think about the impact of the digital transformation on … everything.

Mining 52