article thumbnail

Information Governance Pressure Points – 3 Common Areas of Failure

AIIM

Back in the day, when work was centralized in locations and on devices “within” the enterprise, it was reasonable to assume that control could most effectively be maintained by managing security at the firewall. Information security was largely a function of “keeping the bad guys out.”. Can’t make the live event?

article thumbnail

Free Webinar— Information Governance Plans Stalling? 5 Things You Need this Wednesday

IG Guru

Join us for this informative webinar on Wednesday, October 23, 2019 2:00-2:45 pm EDT (GMT-4) 1 pm CDT; 12 pm MDT; 11 am PDT 7 pm British Time (GMT+1); 8 pm Central Europe Time (GMT +2) *If you’re unable to attend the live event, register and we will send you the replay shortly after the […].

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

URLs Aren’t Archives ¯_(?)_/¯, and Other Stories

The Schedule

Those of us in academic and legal environments have been dealing with link and citation rot for ages. Importantly, modern institutional archives do not make it a practice of taking things, or blindly capturing online records, without first attempting to secure the rights to do so. Journalists are not alone. A Question of Vocabulary.

article thumbnail

Part 2: OMG! Not another digital transformation article! Is it about the evolution from RIM to Content Services?

ARMA International

How will organizations use so-called “vaccine passports” related to employees and customers and how will organizations secure their protected health information (PHI) in response to changing health directives? Much of the content will never be accessed, yet the cost to manage ROT content will continue to increase. Intelligent Capture.

article thumbnail

HSMs: Facilitating Key Management in a Hybrid Cloud Environment

Thales Cloud Protection & Licensing

Encryption isn’t a foolproof security measure, however. A standard means for managing their keys is to use a hardware security module (HSM) to protect their encryption keys against tampering across their entire lifecycle. Use Cases of Hardware Security Modules. All of this takes place within a secure environment.

Cloud 144
article thumbnail

The Hacker Mind Podcast: Learn Competitive Hacking with picoCTF

ForAllSecure

And if you're going for a certification like CISSP Computer Information Systems Security Professional, you'll need to have a breadth of experience across multiple domains. So while you may be particularly skilled in security architecture and engineering. For example, when learning a new subject area. One of the best known starters CTF.

article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

“Commissioned by organizers to predict worst-case scenarios for the Munich games, [Georg] Sieber came up with a range of possibilities, from explosions to plane crashes, for which security teams should be prepared. Latson 2014) Unfortunately, the events unfolded almost exactly like the scenario in Situation Number 21. 2020, p 1).