article thumbnail

Fed Tech Roundup January 5

CTOvision

HyTrust's Jason Lackey: 2-Factor Authentication Could Protect Networks from. Foreign interest in Dell's IT services business could spark federal spinofff - Washington Business Journal (blog). Morgan BOE preparing to roll out one-to-one program - The Decatur Daily. ISO 27001 Certification Achieved by Amyx. ExecutiveBiz (blog).

article thumbnail

James Heckman resigns as Maven CEO after tumultuous run leading Sports Illustrated publisher

GeekWire

Licensing firm Authentic Brands Group, which bought SI in May 2019 from Meredith, sold the magazine’s print and digital publishing rights to Maven. A publicly-traded company, Maven has a coalition of more than 300 brands, including History, Maxim, Yoga Journal, SKI Magazine, and others. the former owner of Sports Illustrated.

Sports 108
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Seattle-based Sports Illustrated publisher Maven sued by former magazine owner Meredith Corp

GeekWire

Licensing firm Authentic Brands Group, which bought SI in May 2019 from Meredith, sold the magazine’s print and digital publishing rights to Maven. A publicly traded company, Maven has a coalition of more than 300 brands, including History, Maxim, Yoga Journal, SKI Magazine, and others. Now Meredith is seeking about $1.1

Sports 82
article thumbnail

Guidance Software Federal Summit 6 March 2014

CTOvision

As the Agency CISO, Mr. Bigman managed a large organization of technical and program officers responsible for the protection of all Agency information. He works with Governments and Fortune 50 corporations to help them build productive information security programs and resist sophisticated nation-state and cyber criminal penetration efforts.

Software 257
article thumbnail

What Is the NIST Phish Scale?

SecureWorld News

Cybersecurity awareness training programs have grown in popularity as cybercrime rates have increased in recent years, and many organizations require their employees to go through this training. Many of these programs focus on phishing, as it is one of the most common attack vectors. The Phish Scale method.

article thumbnail

Safeguarding Intellectual Property: ePub DRM Expertise

Kitaboo

Whether you’re a musician, a business owner or a software program designer, your work represents your passion and the hard work you put in. The need for unique access codes or authentication mechanisms allows DRM to ensure that only authorized users can view or download the content. Why is it so vital?

eBook 78
article thumbnail

The chaotic and cinematic MGM casino hack, explained

Vox

Caesars admitted to the breach in a filing with the Securities and Exchange Commission on Thursday, where it said an “outsourced IT support vendor” was the victim of a “social engineering attack” that resulted in sensitive data about members of its customer loyalty program being stolen. Ransomware attacks aren’t unusual these days.