Remove Document Remove Education Remove Exercises Remove Mining
article thumbnail

Our Data Governance Is Broken. Let’s Reinvent It.

John Battelle's Searchblog

Most of my career has been spent evangelizing the power of technology to positively transform business, education, and politics. Big data, data breaches, data mining, data science…Today, we’re all about the data. Arguably the crowning document of the Enlightenment is…. Today, we are living in the answer. First, Data.

article thumbnail

Fixing Data Breaches Part 2: Data Ownership & Minimisation

Troy Hunt

Yesterday, I wrote the first part of this 5-part series on fixing data breaches and I focused on education. Back in September, a number of people pointed me at Experian's "FREE Dark Web Email Scan" (capitalisation is theirs, not mine) because on the surface of it, it seemed similar to my Have I Been Pwned (HIBP) service.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The State of Content Management in 2020 [Expert Tips & Research]

AIIM

AIIM has been the go-to resource for information professionals to find research, education, and training for over 70 years. The basic idea is an organization will decide to hold off on dealing with legacy paper documents until someone asks for it or the need arises. What does content management look like in 2020, years after ECM died?

ECM 184
article thumbnail

The Trouble with Politicians Sharing Passwords

Troy Hunt

I read this while wandering around in LA on my way home from sitting in front of US Congress and explaining security principles to a government so it felt like a timely opportunity to share my own view on the matter: This illustrates a fundamental lack of privacy and security education. link] — Troy Hunt (@troyhunt) December 2, 2017.

article thumbnail

The Hacker Mind Podcast: Hacking Real World Criminals Online

ForAllSecure

VAMOSI: Once the classified documents were found online, there was an effort -- both by law enforcement and by the media -- to identify the leaker. It turns out some of the classified documents were photographed on a marble countertop, like in a kitchen countertop. Mine was 2000. That’s understandable, given his age.

IT 40
article thumbnail

Sharenting, BYOD and Kids Online: 10 Digital Tips for Modern Day Parents

Troy Hunt

The opening para in the newspaper doesn't do justice to the sentiment of the document which was more around helping kids understand that there are different views to how each of us likes to have our images shared and frankly, that's a good discussion to have. Immunisation. What a ridiculous statement!

Privacy 141
article thumbnail

The Hacker Mind Podcast: The Gentle Art of Lockpicking

ForAllSecure

Ollam: So lockpicking has always been a huge part of the hacker world, and the community, both as a hobby interest, and also now increasingly as with faces like mine as a professional endeavor. You don't want to give them the hardest exercise or the heaviest weights that will discourage them. That gets us in.

IT 52