Remove Course Remove Examples Remove Mining Remove Tips
article thumbnail

#ModernDataMasters: Mike Evans, Chief Technology Officer

Reltio

Of course, our initial MDM project proposal was rejected outright! A passion of mine is imparting the knowledge and experience that the data leaders of today possess to the next generation of data professionals. What are your top 3 tips or resources to share for aspiring modern data masters?

MDM 75
article thumbnail

Fixing Data Breaches Part 2: Data Ownership & Minimisation

Troy Hunt

I wrote a free course for Varonis on GDPR earlier this year and I'm going to be referring to points from there quite a bit in this blog post. I won't go deep into all that here because I explain it in the aforementioned course, but let me sum it up in an easily consumable way: When you give your data to a cat forum, you still own it.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Polar Opposites: The CRM Exams and Vendor Product Language

Brandeis Records Manager

The components, processes, and details of records management are, of course, the focus of exam prep. Multiple-choice testing tips on the ICRM site paid off. Mine has been a positive one, and I thank the ICRM for supporting the opportunity for measurable, professional validation. proved particularly valuable. They were for me.

article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

For example, in March of 2016, two researchers, Mike Ahmadi and Billy Rios independently reported an astounding fourteen hundred vulnerabilities to CareFusion's Pyxis SupplyStation, an automated, networked, supply cabinet used to store and dispense supplies. And of course they've had to deal with issues that have arisen through that.

IT 52
article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

For example, in March of 2016, two researchers, Mike Ahmadi and Billy Rios independently reported an astounding fourteen hundred vulnerabilities to CareFusion's Pyxis SupplyStation, an automated, networked, supply cabinet used to store and dispense supplies. And of course they've had to deal with issues that have arisen through that.

IT 52
article thumbnail

I Now Own the Coinhive Domain. Here's How I'm Fighting Cryptojacking and Doing Good Things with Content Security Policies.

Troy Hunt

I'll give you a perfect example of that last point: in Feb 2018 I wrote about The JavaScript Supply Chain Paradox: SRI, CSP and Trust in Third Party Libraries wherein someone had compromised a JS file on the Browsealoud service and injected the Coinhive script into it. wasm) in their paper. Windows+NT+10.0;+Win64;+x64)+AppleWebKit/537.36+(KHTML,+like+Gecko)+apollohobo/1.0.0+Chrome/58.0.3029.110+Electron/1.7.9+Safari/537.36

Security 145
article thumbnail

Massive Losses Define Epidemic of ‘Pig Butchering’

Krebs on Security

“It’s run by a fraud ring of cryptocurrency scammers who mine dating apps and other social media for victims and the scam is becoming alarmingly popular.” The FBI’s tips on avoiding crypto scams: -Never send money, trade, or invest based on the advice of someone you have only met online. But they will always refuse.

Marketing 294