Remove tag personally-identifiable-information
article thumbnail

SAA/NAGARA/COSA 2018 Recap: Session 201

The Schedule

The report includes topics such as why email matters, technical definitions, lifecycle models, tool workflows, as well as an agenda for email archiving moving forward. Katherine O’Neil from the Manuscript Division of Library of Congress described the process of identifying email within their collections.

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

Humans have used technology to transform their societies from prehistoric times up to the present. Now information technologies and the information revolution are again transforming society. Finally, Part 3 will look to the future, will present next steps, and will discuss key takeaways. Introduction.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Surviving Stalkerware

ForAllSecure

What role might the security industry have in identifying or even stopping it? Lodrina Cherne and Martijn Grooten join the The Hacker Mind podcast to discuss their Black Hat USA 2021 presentation. Cherne: The name of this talk at Black Hat this year is a “Survivor-centric, Trauma-informed Approach to Stalkerware.”

article thumbnail

The Hacker Mind Podcast: EP 69 Self-Healing Operating Systems

ForAllSecure

Michael Coden, Associate Director, Cybersecurity, MIT Sloan, along with Michael Stonebreaker will present this novel concept at RSAC 2023. It was on a project that Dan Kaminsky presented at Discourse 2019. One of the last things Dan presented was a time machine. My my personal work, personal work. Right, okay.