article thumbnail

The Week in Cyber Security and Data Privacy: 20 – 26 November 2023

IT Governance

This week, we’re taking a slightly different approach with the ‘publicly disclosed data breaches and cyber attacks’ category, presenting the most interesting data points in a table format. At the end of each month, these incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks.

article thumbnail

Do You Have the Right Stuff to Transition to Information Governance?

ARMA International

As memorialized in the book The Right Stuff , test pilots then had to decide whether to transition into an uncertain-yet-vaguely-familiar new career or continue along their present path. all of which require the same disciplines we utilize when managing our records. Here’s how one organization pulled this off. A Real-World Example.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

6 Best Threat Intelligence Feeds to Use in 2023

eSecurity Planet

It is a top provider of historical threat data, offering both current and historical metadata on IP addresses, domains, and other IoCs. But other features, like contextualized historic metadata, specialized rulesets, and enriched log data are all helpful for better security response and mitigation strategies. Free trial available.

article thumbnail

SAA/CoSA/NAGARA 2018 recap: Session 204

The Schedule

Beth, Kristen, and Laura presented a program in which they each brought their unique perspective to the management of social media as records within the Federal Government. During her presentation, Beth talked about NARA’s high-level requirements and best practices for capturing records created when Federal agencies use social media.

article thumbnail

A Soccer Field on the Data Center, Chickens in the Parking Lot - in Northern Virginia

Interactive Information Management

A user/purchaser of local resources, from facility supplies, energy and materials to IT equipment and services 4. A participant in local government planning and operations – from energy and land use policy to economic development and homeland security 6. non-profit hosting services) 3.

article thumbnail

The CyberWire Daily Podcast EP. 389 With Guest Speaker David Brumley

ForAllSecure

Its apparent goal is espionage directed against the financial and energy sectors. The company believes that criminals are, quote, "utilizing bots to submit fraudulent admissions applications and obtain institution email addresses through admission application portals," quote. Government agencies are also targeted.

Cloud 52
article thumbnail

The CyberWire Daily Podcast EP. 389 With Guest Speaker David Brumley

ForAllSecure

Its apparent goal is espionage directed against the financial and energy sectors. The company believes that criminals are, quote, "utilizing bots to submit fraudulent admissions applications and obtain institution email addresses through admission application portals," quote. Government agencies are also targeted.

Cloud 40