article thumbnail

A Short Cybersecurity Writing Course Just for You

Lenny Zeltser

My new writing course for cybersecurity professionals teaches how to write better reports, emails, and other content we regularly create. It’s a course I wish I could’ve attended when I needed to improve my own security writing skills. I titled the course The Secrets to Successful Cybersecurity Writing: Hack the Reader.

article thumbnail

New Year’s Resolutions 101: Examples and Suggestions from Old Patents

Unwritten Record

Check out this fancy little “Race Course Toy Bank!” John Hall Race Course Toy Bank. Sherr in 1841, looks as if it might present a nice challenge if you are up for it. If you are looking to save a little extra money, having an interesting coin bank can make storing away spare change fun and interesting. Invented in 1871 by J.

IT 44
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Toyota presented PASTA (Portable Automotive Security Testbed) Car-Hacking Tool

Security Affairs

At the BLACK HAT EUROPE 2018 held in London the duo presented the tool and confirmed that Toyota plans to share the specifications on Github and will start selling the fully built system in Japan. You can download slides and the research paper from the following link: • Download Presentation Slides. • Download White Paper.

article thumbnail

How to Get the Most Out of Your E-Learning Programme

IT Governance

Did you know that when presented with new information, we will forget half of it within a day? You can probably attest to this anecdotally, but it also presents major issues in the workplace – particularly when it comes to staff awareness training. Ideally, examples should be used to make the lessons clearer.

article thumbnail

Intelligent Information Management (IIM) Policies and the Law - Part 2

AIIM

In my first post, where we explored the principle of hearsay , we left off asking about the relationship between IIM policies and the "ordinary course of business." What's the Relationship Between IIM Policies and the "Ordinary Course of Business"? So, let's take a look.

Paper 159
article thumbnail

Intelligent Information Management (IIM) Policies and the Law - Part 1

AIIM

Simple Example. Let’s take a simple example. If you had to testify later in court, you could present the statement in the memo as the trigger for your decision to leave the office. If you had to testify later in court, you could present the statement in the memo as the trigger for your decision to leave the office.

Education 169
article thumbnail

Privacy and Cybersecurity Due Diligence Considerations in M&A Transactions

Data Protection Report

In the course of their privacy and cybersecurity due diligence, buyers should consider the following when assessing the risks associated with purchasing a company: First, how robust are the company’s data security and information technology (IT) practices? Additional measures may also be required depending on the context.

Privacy 121