article thumbnail

Management by Magazine (InfoGov Edition)

Weissman's World

Today, on Perpective Check: The truth and consequences of your boss flipping through the pages of a magazine and saying, “I just read about [new shiny infogov object] that EVERYBODY’S using. The post Management by Magazine (InfoGov Edition) appeared first on Holly Group. How come we’re not??”

article thumbnail

Why Information Architecture is VITAL to Information Governance

Weissman's World

Our very own Kevin Parker has written another stellar piece on the importance of information architecture to information governance. You can read it in ARMA’s Information Management Magazine – and if you want to learn more, register for Kevin’s ARMA iMasters Webinar on February 27. He IS a busy boy!

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Journalist Matthew Keys is now charged with an attack on a magazine

Security Affairs

Matthew Keys, a former Reuters journalist, who was sentenced to 2 years in prison for hacking attacks on California media is now charged with an attack on a magazine. Keys was accused of providing Anonymous login credentials that allowed the group to deface access and deface the website of the Los Angeles Times in 2013.

CMS 90
article thumbnail

Russian Cybersecurity Executive Arrested for Alleged Role in 2012 Megahacks

Krebs on Security

Experts say Kislitsin’s prosecution could soon put the Kazakhstan government in a sticky diplomatic position, as the Kremlin is already signaling that it intends to block his extradition to the United States. ”] Kislitsin was hired by Group-IB in January 2013, nearly six months after the Formspring hack.

article thumbnail

Who to Follow in 2019 for Big Data, Data Governance and GDPR Advice

erwin

With this in mind, the erwin team has compiled a list of the most valuable data governance, GDPR and Big data blogs and news sources for data management and data governance best practice advice from around the web. to driving revenue through proactive data governance initiatives and Big Data strategies, these accounts cover it all.

article thumbnail

Security Affairs newsletter Round 349

Security Affairs

Threat actors stole $18.7M Threat actors stole $18.7M Threat actors stole $18.7M US NCSC and DoS share best practices against surveillance tools Swiss army asks its personnel to use the Threema instant-messaging app Russian submarines threatening undersea cables, UK defence chief warns.

article thumbnail

Security Affairs newsletter Round 313

Security Affairs

Experts found critical authentication bypass flaw in HPE Edgeline Infrastructure Manager UNC2529, a new sophisticated cybercrime gang that targets U.S. Follow me on Twitter: @securityaffairs and Facebook.