Remove tag security-rule
article thumbnail

How to Build a Metadata Plan in Five Steps

AIIM

During this step, conduct interviews, surveys, or workshops to gain input from business, IT, and records management stakeholders. Determine if rules need to be established; for example, a title field may be limited to 100 characters, or date/time fields set to use international display standards. customer number vs. customer ID).

Metadata 163
article thumbnail

The Hacker Mind Podcast: Learn Competitive Hacking with picoCTF

ForAllSecure

And if you're going for a certification like CISSP Computer Information Systems Security Professional, you'll need to have a breadth of experience across multiple domains. So while you may be particularly skilled in security architecture and engineering. No matter what your age or interest level, picoCTF has something for you to learn.

article thumbnail

The Hacker Mind Podcast: Surviving Stalkerware

ForAllSecure

What role might the security industry have in identifying or even stopping it? Welcome to the hacker mind, in original podcast from for all security. I'm a principal on the security team at Cybereason, and I'm also a digital forensics instructor at the SANS Institute, Grooten: Martijn Grooten. It's natural.