Remove Information Security Remove Libraries Remove Mining Remove Sales
article thumbnail

Weekly podcast: Australian Cabinet Files, Matt Hancock MP’s app and Monero mining

IT Governance

Data breaches don’t just occur when cyber criminals hack your systems, and it’s as well to remember that sensitive information in all forms – including hard copy records – should be afforded appropriate protection. The app then still […] accesses the photo library whether the user denies access or not.”. What’s that?

Mining 66
article thumbnail

Weekly podcast: 2018 end-of-year roundup

IT Governance

This week, in our last podcast of the year, we revisit some of the biggest information security stories from the past 12 months. As is now traditional, I’ve installed myself in the porter’s chair next to the fire in the library, ready to recap some of the year’s more newsworthy information security events.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Establishing Records Management at Brandeis—The First Eighteen Months

Brandeis Records Manager

We made early acquaintances with Legal and Information Security leaders. sales-type and corporate-heavy rhetoric and more institutional case studies and stories in the open RM literature (and outside of the expensive RM conferences). We were proactive with offers to present on the program at any venue. So, that’s where we are.

article thumbnail

EP 49: LoL

ForAllSecure

Sometimes it can be really complex DLLs and they call that hijacking or DLL hijacking and what they'll do is they'll use a legitimate program that depends on a library, bring their malicious library with them and it gets sometimes side loaded. Sometimes it can be really complex DLLs and they call that hijacking or DLL hijacking.