article thumbnail

Past, present and future in a digital transformation journey

OpenText Information Management

According to Gartner, a digital transformation includes information technology modernization, adoption of cloud computing, … The post Past, present and future in a digital transformation journey appeared first on OpenText Blogs. The objective is often tied to cost leadership, increased competitiveness or simply moving into a niche.

article thumbnail

Best Practices Q&A: Guidance about what directors need to hear from CISOs — from a board member

The Last Watchdog

She serves on the board of several technology companies and also happens to be steeped in cyber risk governance. Thus, presenting a sky-is-falling scenario to justify a fatter security budget, “does not resonate at the board level,” she said in her talk. Here’s that exchange, edited for clarity and length.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Coal Mining in Alaska: Coal Fields of the Alaska Engineering Commission

Unwritten Record

Mining has been a vital part of Alaska’s economy for hundreds of years. Often when we think of mining in Alaska, we think of gold mining and the gold rush of the late 1800s. An English trader named Captain Nathaniel Portlock first found coal at Coal Cove (presently Port Graham) on the Kenai Peninsula in 1786.

Mining 46
article thumbnail

Group-IB presented latest cybercrime and nation-state hacking trends in Asia

Security Affairs

According to Group-IB’s report findings, Asia is one of the most actively attacked regions in the world, the company presented latest cybercrime trends. A relatively new method of fraud on the ICO market was stealing a White Paper of ICO project and presenting an identical idea under a new brand name. About the author Group-IB.

article thumbnail

Chinese Antivirus Firm Was Part of APT41 ‘Supply Chain’ Attack

Krebs on Security

The government alleges the men used malware-laced phishing emails and “supply chain” attacks to steal data from companies and their customers. APT41’s activities span from the mid-2000s to the present day. One of the alleged hackers was first profiled here in 2012 as the owner of a Chinese antivirus firm. .”

article thumbnail

Do You Have the Right Stuff to Transition to Information Governance?

ARMA International

As memorialized in the book The Right Stuff , test pilots then had to decide whether to transition into an uncertain-yet-vaguely-familiar new career or continue along their present path. Follow this trajectory and you’ll push the envelope toward information governance (IG) and position yourself as a Very Important Person in your enterprise.

article thumbnail

Top 10 Governance, Risk and Compliance (GRC) Vendors

eSecurity Planet

Governance, risk, and compliance (GRC) software helps businesses manage all of the necessary documentation and processes for ensuring maximum productivity and preparedness. Third-party governance. Like other competitive GRC solutions, it speeds the process of aggregating and mining data, building reports, and managing files.