Remove tag personally-identifiable-information
article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

Now information technologies and the information revolution are again transforming society. Part 2 will discuss the critical factors for a successful DT journey, because organizations need to do a “mind-shift” from traditional records and information management (RIM) practices to content services (CS). Introduction.

article thumbnail

The Hacker Mind Podcast: Surviving Stalkerware

ForAllSecure

What role might the security industry have in identifying or even stopping it? It says that spy phones sold real time access to that information, which could have enabled domestic abusers and stalkers to track their targets. I personally wanted to make that point in 25 minutes, Black Hat presentation part of.

article thumbnail

Understanding Have I Been Pwned's Use of SHA-1 and k-Anonymity

Troy Hunt

Or alternatively: Our [insert title of person who fills out paperwork but has no technical understanding here] says that k-anonymity involves sending you PII. However, what if you could manufacture a hash collision? It works beautifully; it's ridiculously fast, efficient and above all, anonymous. It's insecure and deprecated.

Passwords 123