Remove 10
Remove 2018 Remove Events Remove Privacy Remove Security Remove Video
article thumbnail

Sophie Sayer on the IT Governance Partner Programme

IT Governance

The benefits of partnering with us, and our partner-exclusive event IT Governance launched its partner programme in 2017, which now includes more than 400 organisations. What else can partners expect from the event? And why should organisations consider partnering with IT Governance? What is it that makes IT Governance special?

article thumbnail

Is India's Aadhaar System Really "Hack-Proof"? Assessing a Publicly Observable Security Posture

Troy Hunt

million records on US consumers (this started a series events which ultimately led to me testifying in front of Congress ), South Africa had data on everyone living in the country (and a bunch of deceased folks as well) leaked by a sloppy real estate agent and data from Australia's Medicare system was being sold to anyone able to come up with $30.

Security 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: The back story on the convergence, continuing evolution of endpoint security

The Last Watchdog

The technology that corrals malicious software circulating through desktop PCs, laptops and mobile devices has evolved into a multi-layered security technology referred to as ‘endpoint security.’. What’s more, they’ve all successfully grown into multi-layered full-service endpoint security suppliers. keep intensifying.

article thumbnail

Part 2: OMG! Not another digital transformation article! Is it about the evolution from RIM to Content Services?

ARMA International

This part will also discuss managing CS risks such as ransomware, privacy, change management, and user adoption. How will organizations use so-called “vaccine passports” related to employees and customers and how will organizations secure their protected health information (PHI) in response to changing health directives? Introduction.

article thumbnail

A Decade of Have I Been Pwned

Troy Hunt

” Anyone can type in an email address into the site to check if their personal data has been compromised in a security breach. Back in 2018, Gizmodo reckoned HIBP was one of the top 100 websites that shaped the internet as we knew it , alongside the likes of Wikipedia, Google, Amazon and Goatse (don't Google it).

article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

This part also discusses managing CS risks such as ransomware, privacy, change management, and user adoption. Commissioned by organizers to predict worst-case scenarios for the Munich games, [Georg] Sieber came up with a range of possibilities, from explosions to plane crashes, for which security teams should be prepared. Introduction.

article thumbnail

The debate on the Data Protection Bill in the House of Lords

Data Protector

What follows below is an edited version of the debate in the House of Lords of the Second Reading of the Data Protection Bill, held on 10 October. Where the Information Commissioner gives notices to data controllers, she can now secure compliance, with the power to issue substantial administrative penalties of up to 4% of global turnover.

GDPR 120