Top 5 Unexpected Consequences of GDPR

June 7, 2018 | Written by: Richard Hogg The European Union’s General Data Protection Regulation (GDPR) is finally here, promising to put individuals back in control...

Report shows increase in social engineering

 Emma Bordessa  13th July 2018 Proofpoint’s The Human Factor 2018 Report revealed that over the past year, cyber criminals have continued to increase their use of social...

ICRM Partners with LIU Post Palmer School of Library and Information...

July 23, 2018 The Institute of Certified Records Managers (ICRM) and the LIU Post Palmer School of Library and Information Science, announce a strategic partnership...

16 popular VPNs leak your data: Here’s the full list

VPNs are becoming increasingly popular due to data privacy concerns, but a new report found that some aren't effective.

ARMA announces this year’s keynote speaker, Dr. Jennifer Golbeck, Ph.D.

ARMA is pleased to announce this year’s keynote speaker, Dr. Jennifer Golbeck, Ph.D. Jennifer is the Director of the Social Intelligence Lab at the University...

Review: A Counterfeit, $100 iPhone X

We disassembled the phone and asked security researchers to probe it to find out what it is. Verdict: It's wild.

Three Fundamental Digital Preservation Strategies

July 9, 2018 by Margot Note, CA, CRM Digital files exist simply as data until they are rendered by application software, operating systems, and hardware...

SAA Statement on Presidential Records

June 22, 2018—The Society of American Archivists is deeply concerned about a recent report of the alleged ongoing destruction of presidential records by President Donald Trump, in...

Goodman of ARMA’s Board Sees New California Privacy Act as ‘De...

July 16, 2018 California's new Consumer Privacy Act of 2018 is likely to be treated as a de facto nationwide requirement, says information privacy expert Susan Goodman, a member...

The Information Governance Conference Announces 2018 Keynote Speaker

Drones and related technologies continue to tangle up courtrooms - with implications on downstream information, autonomous vehicles, manufacturing, healthcare, and so much more. That's why we're...

A Review: Infonomics

Infonomics, by Douglas B. Laney at Gartner, Inc. is a book on how to monetize, manager, and measure information as an asset for competitive...

Preparing your RIM program for the 2020’s

unsplash-logoSamuel Zeller By Andrew Ysasi, FIP, CIPM, CIPP, CISM, PMP, CRM, IGP July 18, 2018 Records and Information Management (RIM) has seemingly been pushed aside for loftier...

Federal Legislation Could Open New Doors for State, Local Bug Programs

State and local agencies have yet to fully embrace bug bounty programs, but a bill introduced last month may provide an introduction to bug bounty programs.

Inside China’s Dystopian Dreams: A.I., Shame and Lots of Cameras

By Paul Mozur July 8, 2018 ZHENGZHOU, China — In the Chinese city of Zhengzhou, a police officer wearing facial recognition glasses spotted a heroin smuggler at...

German police raid cyber-privacy groups

WRITTEN BY Patrick Howell O'Neill JUL 5, 2018 | CYBERSCOOP A suite of internet privacy-enabling tools is at the center of a storm brewing in Germany over...

Google to Face Multibillion-Euro European Union Antitrust Fine

By Valentina Pop and Sam Schechner Updated July 10, 2018 3:38 p.m. ET BRUSSELS—The European Union’s antitrust watchdog is expected to find Alphabet Inc.’sGOOGL -0.01% Google illegally abused the dominance of its Android...