Remove Exercises Remove Mining Remove Security Remove Video
article thumbnail

How to Tackle the Information Management Challenges of Legacy Applications

AIIM

And relying on legacy technology creates business risk because these older systems are much harder to fix when things go wrong and more vulnerable to security threats. Relocating the data from a legacy system to a modern ECM system is also a relatively simple one-off exercise that should quickly pay for itself.

ECM 167
article thumbnail

Sustaining Performance Under Extreme Stress

Troy Hunt

The thing that perhaps surprised me most about those discussions with friends was how much their own stories resonated with mine. It was an exercise that enabled me to look much further down the road and consider whether it aligned to an earlier point in this blog post - my big picture. I drank beer on my own in a pub: Cheers!

Sales 142
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The 773 Million Record "Collection #1" Data Breach

Troy Hunt

I've written before about what's involved in verifying data breaches and it's often a non-trivial exercise. If @1Password was to integrate with my newly released Pwned Passwords k-Anonymity model so you could securely check your exposure against the service (it'd have to be opt in, of course). Oh wow - look at this!

article thumbnail

The Trouble with Politicians Sharing Passwords

Troy Hunt

I read this while wandering around in LA on my way home from sitting in front of US Congress and explaining security principles to a government so it felt like a timely opportunity to share my own view on the matter: This illustrates a fundamental lack of privacy and security education. needs to meet this need and be secure also.

article thumbnail

Sharenting, BYOD and Kids Online: 10 Digital Tips for Modern Day Parents

Troy Hunt

And importantly, teaching them how to use secure passwords with @1Password ?? Neither will my daughter when I share a video of her coding at home: Got my 5 year old daughter coding up a storm on her school holidays, she loves it! He won't be emotionally scarred, nor will he grow up feeling like his privacy has been violated.

Privacy 141
article thumbnail

How to Track Your Kids (and Other People's Kids) With the TicTocTrack Watch

Troy Hunt

Two months later, critical security flaws still remained in some of the watches tested , the most egregious of which was with Gator's product: Adding to the severity of the issues, Gator Norge gave the customers of the Gator2 watches a new Gator3 watch as compensation. Around a year later, Pen Test Partners in the UK found more security bugs.

Passwords 111
article thumbnail

Project Svalbard, Have I Been Pwned and its Ongoing Independence

Troy Hunt

They didn't know who I was, had likely never heard of Have I Been Pwned before this exercise and if I was to take a guess, wouldn't have even known how to pronounce it. We whittled the original 141 companies down to the 43 that were best aligned to the goals I outlined in the original blog post. of the company. I got a bill for that argument.

IT 136