Remove 02
article thumbnail

Expectations and opportunities in using bank consumer personal data

CGI

Expectations and opportunities in using bank consumer personal data. Fri, 02/19/2016 - 01:49. A top business priority for banks today is to have a complete 360 degree view of customers through the collection and use of personal data. To effectively manage data, it helps to know how consumers expect their information to be used.

article thumbnail

SAA/CoSA/NAGARA 2018 recap: Session 204

The Schedule

NARA’s policies are social media include: NARA Bulletin 2015-02: Guidance on managing electronic messages. NARA Bulletin 2014-02: Guidance on managing social media records. While one can consult the Federal definition of records as defined in the Federal Records Act (44 U.S.C. Best Practices for Social Media White Paper.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The remote control tower ….the remote control airport? Enabled by the Internet of Things.

CGI

Wed, 11/26/2014 - 02:06. The idea of controllers using high definition cameras and remote sensing equipment to manage airport traffic from potentially hundreds or even thousands of miles away is a tantalising prospect. The remote control tower ….the the remote control airport? Enabled by the Internet of Things.

IoT 40
article thumbnail

*bleed continues: 18 byte file, $14k bounty, for leaking private Yahoo! Mail images

Scary Beasts Security

00 04 00 04: image dimensions 1024 x 1024 02: flags 0x02 (no background color) 01: 1 plane (i.e. This means that the process memory space of the exploited process is only likely to contain the attacker's image data, making exploitation much less interesting (but not irrelevant as we saw in my recent Box and DropBox blog posts).

article thumbnail

Open Source Security Podcast EP. 151 - The DARPA Cyber Grand Challenge With David Brumley

ForAllSecure

In 2014, DARPA announced a Cyber Grand Challenge. In 2014, they issued a similar question, "Hey, can we build self-driving app security?" David Brumley : 02:09 It was actually kind of genius, right? Josh Bressers : 02:28 That's awesome. ” David Brumley : 02:37 I think it is. You're either secure or insecure.

article thumbnail

Open Source Security Podcast EP. 151 - The DARPA Cyber Grand Challenge With David Brumley

ForAllSecure

In 2014, DARPA announced a Cyber Grand Challenge. In 2014, they issued a similar question, "Hey, can we build self-driving app security?" David Brumley : 02:09 It was actually kind of genius, right? Josh Bressers : 02:28 That's awesome. ” David Brumley : 02:37 I think it is. You're either secure or insecure.

article thumbnail

OPEN SOURCE SECURITY PODCAST EP. 151-- THE DARPA CYBER GRAND CHALLENGE WITH DAVID BRUMLEY

ForAllSecure

In 2014, DARPA announced a Cyber Grand Challenge. In 2014, they issued a similar question, "Hey, can we build self-driving app security?" David Brumley : 02:09 It was actually kind of genius, right? Josh Bressers : 02:28 That's awesome. ” David Brumley : 02:37 I think it is. You're either secure or insecure.