Remove category security-breach
article thumbnail

The Burden of Privacy In Discovery

Data Matters

4 The Federal Rules of Civil Procedure have begun — since their inception — with a guiding command for courts to seek “to secure the just, speedy, and inexpensive determination of every action and proceeding.”5 19 No longer are the proportionality considerations described as separate “limitations” on an inquiry governed solely by relevance.20

Privacy 97
article thumbnail

Predictions 2017 – How’d I Do This Year?

John Battelle's Searchblog

One year later, chatbots have faded (but “appbots” are on the rise ), and voice-driven systems have secured a place in our shared culture. One year later, chatbots have faded (but “appbots” are on the rise ), and voice-driven systems have secured a place in our shared culture. As it turns out, my musings were often on target.

Privacy 55
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Predictions 2017 – How’d I Do This Year?

John Battelle's Searchblog

One year later, chatbots have faded (but “appbots” are on the rise ), and voice-driven systems have secured a place in our shared culture. One year later, chatbots have faded (but “appbots” are on the rise ), and voice-driven systems have secured a place in our shared culture. As it turns out, my musings were often on target.

Privacy 40
article thumbnail

Predictions 2017 – How’d I Do This Year?

John Battelle's Searchblog

One year later, chatbots have faded (but “appbots” are on the rise ), and voice-driven systems have secured a place in our shared culture. One year later, chatbots have faded (but “appbots” are on the rise ), and voice-driven systems have secured a place in our shared culture. As it turns out, my musings were often on target.

Privacy 40
article thumbnail

An Approach to Cybersecurity Risk Oversight for Corporate Directors

Data Matters

Recent guidance from the Securities and Exchange Commission (SEC) on disclosure and enforcement actions by the Federal Trade Commission (FTC) make clear that cybersecurity is no longer a niche topic, but a concern significant enough to warrant the oversight of corporate boards of directors. Creating an enterprise-wide governance structure.

article thumbnail

The Hacker Mind: Shattering InfoSec's Glass Ceiling

ForAllSecure

And I was really fortunate to land the security beat right away. I wrote two books, one on IoT Security and another with Kevin Mitnick, then jumped around a couple of different jobs. What if you are a woman in information security? By accident. So I learned. I went to Black Hat in 2000. I went to smaller conferences.

Cloud 40
article thumbnail

Email Is the Biggest Threat to Business, So Why Is Everyone Using It?

Adam Levin

Microsoft’s Outlook.com service suffered a major breach earlier this year. Email addresses are still the main way we authenticate ourselves to do business online, and because of that email as a category represents an extremely weak link in our collective cybersecurity. This news was no shocker. Email is foundational.

IT 45