Welcome Listserv Members!

Welcome Listserv Members! Welcome to IG GURU – www.igguru.net! Peter, Marc, and the founders of the Listserv did a fantastic job providing a community and forum...

NIST Begins Developing a Voluntary Online Privacy Framework

Friday, November 2, 2018 The Department of Commerce’s National Institute of Standards and Technology (“NIST”) announced in early September intention to create a Privacy Framework.  This Privacy...

PREVENTING DOCUMENT DAMAGE NIGHTMARES

If you’ve never experienced a paper-related disaster, you’d be surprised how fast things can go off the rails in document storage areas. And schools,...

Best Practices for Planning a Digitization Project

As archivists, we take our responsibilities seriously as stewards of the collections entrusted to our care, ensuring that our assets remain safe and accessible...

NAID/PRISM 2019 Conference Agenda Published

The upcoming conference is in April of 2019 in Denver, CO.  Published agenda is located here.

How fast is your internet connection?

Ever wonder if you are getting what you paid for?  Check out Ookla's speed test.  There are other tests out there, but their utility...

New Intel CPU Flaw Exploits Hyper-Threading to Steal Encrypted Data

November 3rd, 2018 A team of security researchers has discovered another serious side-channel vulnerability in Intel CPUs that could allow an attacker to sniff out...

Digital Rights Management (DRM) White Paper Released

11/2/2018:  Washington, D.C. – Seeking to arm government archivists and records managers with important information and guidance surrounding the protection of rights associated with...

Nine Duties of an Information Security Professional

by Dr. Shuyler Jan Buitron, DCS, MSIA, CISSP, MCSE Throughout my information technology and information security careers, I have encountered many different philosophies and ways...

Information Governance World Magazine Now Available!

The world's first magazine covering IG topics & featuring interviews with industry leaders is here! Information Governance World magazine is now available -in print and digital...

Facebook gets maximum fine for the catastrophic Cambridge Analytica data breach

Facebook has been fined £500,000 ($645,000) by the UK's Information Commissioner's Office for the Cambridge Analytica data breach. It is the maximum possible fine available...

Here Are 5 Hotel Scams You Should Know About

Identity thieves love to target the hospitality sector because there is a lot of secure records that are collected and stored which include –...

NAID AAA Certification: Now Required by e-Stewards, Launches Network Participant Program

The network of independent electronics recycling companies operating under the e-Stewards Certification announced that NAID AAA Certification would serve as the required verification for...

Cybersecurity Needs Women: Here’s Why

This fantastic article can be found here on Forbes

Canada’s Mandatory Privacy Breach Reporting Requirements coming into force November 1,...

Starting on November 1, organizations across Canada subject to the Personal Information Protection and Electronic Documents Act (PIPEDA) will be required to provide notice of certain...

Technology Executive Monte Ford Appointed To Iron Mountain Board Of Directors

NEWS PROVIDED BY Iron Mountain Incorporated  Oct 15, 2018, 06:00 ET BOSTON, Oct. 15, 2018 /PRNewswire/ -- Iron Mountain Incorporated (NYSE: IRM), the storage and information management company, has appointed Monte Ford to...

LibSSH Flaw Allows Hackers to Take Over Servers Without Password

October 16, 2018Mohit Kumar A four-year-old severe vulnerability has been discovered in the Secure Shell (SSH) implementation library known as Libssh that could allow anyone to completely...

IAPP Summit 2019 Call For Proposals

Visit this link for submission information.

MER 2019 Registration Now Open

Visit the registration site here

Call for Speakers – Privacy+Security Forum

Speaker Submission Link

Does Information Security Have a Future?

by Dr. Shuyler J. Buitron, DCS, MSIA, CISSP, MCSE Even though the apparent and hopeful answer to the title question is ‘yes, information security...