Remove 10
article thumbnail

IBM X-Force Exchange Threat Intelligence Platform

eSecurity Planet

Product History Internet Security Systems developed X-force in 1996 and ISS was later acquired by IBM in 2006, after which the X-Force brand became part of IBM Security. For a comparison with other TIP products, see the complete list of top threat intelligence companies.

Retail 97
article thumbnail

How we ended up in an era of intentional ignorance

WIRED Threat Level

” Big Wide Logic | Internet Stone Soup | July 10, 2017. Here’s a six-month old essay about online media that resonated with me for a couple of reasons.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Burden of Privacy In Discovery

Data Matters

Should privacy be considered a “burden” under the proportionality analysis required by Federal Rule of Civil Procedure Rule 26(b)? 3 As a result, an emerging consensus of courts and commentators has concluded that privacy interests may — and indeed, should — be considered as part of the proportionality analysis required under Rule 26(b)(1).

Privacy 97
article thumbnail

Encouraging students to improve their IL skills

CILIP

The use of models in various capacities has been an integral component within the programme of information literacy (IL) instruction that I have delivered to sixth formers in my own school for nearly 10 years. Information Research Watch International, February 2006, pp. Published: December 2016/January 2017. References.

article thumbnail

An Approach to Cybersecurity Risk Oversight for Corporate Directors

Data Matters

In January 2017, seeking to provide practical advice for directors to address their oversight responsibilities, the National Association of Corporate Directors (NACD) released its (revised) Handbook on Cyber-Risk Oversight (NACD Handbook). Designing an Enterprise-Level Approach.