Remove tag privacy-rule
Remove Government Remove Mining Remove Privacy Remove Security
article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

This part will also discuss managing CS risks such as ransomware, privacy, change management, and user adoption. This can also include customer’s expectations such as intuitive navigation, faceted search, search experience, multi-language support, web accessibility, customer privacy, tracking cookies, and marketing opt-out.

article thumbnail

The Hacker Mind Podcast: Surviving Stalkerware

ForAllSecure

What role might the security industry have in identifying or even stopping it? Welcome to the hacker mind, in original podcast from for all security. I'm a principal on the security team at Cybereason, and I'm also a digital forensics instructor at the SANS Institute, Grooten: Martijn Grooten. So I hope you'll stick around.

article thumbnail

Microsoft Office Sharepoint Server: a next generation of deeper, wider content silos? | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. Taxonomies and tagging, threaded discussion, wikis and other ‘Enterprise 2.0 ‘ tools are an alternative solution to the problem of generating mountains of hard to find silo’d information and associated email.