Remove tag microsoft
article thumbnail

What Can We Learn About the IG Profession from the ARMA InfoCon 2020 Taxonomy

ARMA International

Now, many of the terms in our taxonomy represent common themes you’d expect to see at an ARMA conference, terms like “records management,” “information governance,” and “information management.” Information Governance Implementation Model: Our IG model was launched earlier this year; a few sessions are specifically adapted to the model.

ROT 65
article thumbnail

The UK and Australian Governments Are Now Monitoring Their Gov Domains on Have I Been Pwned

Troy Hunt

" I built it in part to help people answer that question and in part because my inner geek wanted to build an interesting project on Microsoft's Azure. And this is precisely why I'm writing this piece - to talk about how I'm assisting the UK and Australian governments with access to data about their own domains.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The JavaScript Supply Chain Paradox: SRI, CSP and Trust in Third Party Libraries

Troy Hunt

This tag was in the source code over at secure.donaldjtrump.com/donate-homepage yet it was pulling script directly off Igor Escobar's GitHub repository for the project. Even my own state government down here had been hit. I know, we're all shocked but bear with me because it's an important part of the narrative of this post.

article thumbnail

Subresource Integrity and Upgrade-Insecure-Requests are Now Supported in Microsoft Edge

Troy Hunt

I recently wrote about the Browsealoud problem where a cryptominer ended up on a bunch of government websites due to them embedding an external script and allowing it to run whatever it wanted to in the context of their site. No - cyber-sticky tape! And so it is with trusting JavaScript served from third parties.

IT 48
article thumbnail

The Hacker Mind Podcast: Surviving Stalkerware

ForAllSecure

What role does technology play in facilitating intimate partner abuse? What role might the security industry have in identifying or even stopping it? Lodrina Cherne and Martijn Grooten join the The Hacker Mind podcast to discuss their Black Hat USA 2021 presentation. Vamosi: Ever get the feeling that someone is watching you. It's natural.

article thumbnail

The Hacker Mind Podcast: Hacking Diversity

ForAllSecure

So I went and got a master's in it from Johns Hopkins University, and continue there for a little while and then it actually ended up switching over to a job where I was working in information assurance and quality assurance for the government, I've been government facing for, you know, pretty much my entire career at this point.

article thumbnail

The Hacker Mind Podcast: Hacking Diversity

ForAllSecure

So I went and got a master's in it from Johns Hopkins University, and continue there for a little while and then it actually ended up switching over to a job where I was working in information assurance and quality assurance for the government, I've been government facing for, you know, pretty much my entire career at this point.