article thumbnail

BOOK REVIEW: ‘Security Yearbook’ preserves cybersecurity history — highlights tectonic shift

The Last Watchdog

Related: The role of PKI is securing digital transformation That was in 2002. Companies today spent vast amounts on incredibly sophisticated defenses, such as next-gen firewalls , EDR , DLP and IDS technologies that generate oceans of threat feeds pouring into artificially intelligent SIEMs , UEBAs and other analytics platforms.

article thumbnail

EU Council Agrees on Proposed ePrivacy Regulation

Data Matters

The ePrivacy Regulation is meant to replace the existing ePrivacy Directive 2002/58 (ePrivacy Directive), which dates to 2002 and was meant to address the requirements of new digital technologies and facilitate the advance of electronic communication services.

GDPR 68
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CloudNine Acquires eDiscovery Product Lines from LexisNexis

eDiscovery Daily

“The ability to offer a hybrid of both on-premise and off-premise software coupled with our automated software allows us to support customer needs regardless of their eDiscovery task, security, and cost requirements. As a user of many of the purchased product line offerings for more than a decade, we understand their utility and potential.

article thumbnail

Part 2: OMG! Not another digital transformation article! Is it about the evolution from RIM to Content Services?

ARMA International

Now the Fourth Industrial Revolution [2] is “digitizing the farm”— that is, radically reimagining agriculture through big data analytics that help farmers increase crop yields and using artificial intelligence (AI) to monitor pests, plant diseases, soil nutrients, and other growing conditions. Artificial Intelligence.

article thumbnail

Guest Post -- New Global Data  and Privacy Regulations in 2018 and the GDPR

AIIM

In 2002, EC Vice President, Commissioner Viviane Reding initially proposed reform to data privacy rules in the European Union. He’s a married father of three boys and enjoys spending time playing with his kids and his guitars when not fighting for intelligent information management. Gimmal recently interviewed i2kconnect CEO Reid K.

GDPR 85
article thumbnail

The Hacker Mind Podcast: Ethical Hacking

ForAllSecure

The US Justice Department says it will no longer prosecute good-faith security researchers, but what constitutes good-faith security research? It will no longer prosecute good-faith security research that would have otherwise violated the Computer Fraud and Abuse Act (CFAA). Is hacking a crime? Who is responsible?

IT 52
article thumbnail

Top Cybersecurity Companies for 2021

eSecurity Planet

As the demand for robust security defense grows by the day, the market for cybersecurity technology has exploded, as well as the number of available solutions. Syxsense Secure. Stop breaches with one endpoint security solution. Pre-built templates keep organizations secure without needing large teams and specialists.