Remove 2008 Remove Analysis Remove Education Remove Government
article thumbnail

Purple Lambert, a new malware of CIA-linked Lambert APT group

Security Affairs

A deeper analysis of some of these samples revealed that they were compiled in 2014 and used in the wild between 2014 and 2015. ” The Lambert APT (aka Longhorn APT ) has been active since at least 2008, but its first samples were spotted in 2014. reads the analysis published by Symantec.

article thumbnail

GE's Enterprise Collaboration Backbone | ZDNet

Collaboration 2.0

GEs Enterprise Collaboration Backbone By Oliver Marks | July 17, 2008, 4:01pm PDT Summary General Electric, the venerable multinational that was founded in 1878 in New Jersey, have at their core a hugely sophisticated enterprise collaboration system that is arguably the largest in the world. Hot Topics iPhone iPad Enterprise 2.0

Paper 88
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Humanitarian Collaboration | ZDNet

Collaboration 2.0

Humanitarian Collaboration By Oliver Marks | August 10, 2008, 12:51pm PDT Summary I was recently fascinated by presentations by Bob Iannucci (CTO, Nokia) and Ken Banks of kiwanja.net at the Supernova2008 conference in June around mobile technologies in the developing world. Hot Topics iPhone iPad Enterprise 2.0

article thumbnail

Inside ‘Evil Corp,’ a $100M Cybercrime Menace

Krebs on Security

Yakubets , who the government says went by the nicknames “ aqua ,” and “ aquamo ,” among others. KrebsOnSecurity first encountered Aqua’s work in 2008 as a reporter for The Washington Post. What follows is an insider’s look at the back-end operations of this gang. Image: FBI. HITCHED TO A MULE.

article thumbnail

Searching for definition | ZDNet

Collaboration 2.0

Searching for definition By Oliver Marks | June 15, 2008, 10:51pm PDT Summary A recurring theme for me at the Enterprise 2.0 fr0thy2 06/15/2008 11:37 PM Reply to Flag RE: Searching for definition Andrew McAfee asked if we would kindly update the Wikipedia entry on Enterprise 2.0 Hot Topics iPhone iPad Enterprise 2.0 What OS do you run?

Paper 40
article thumbnail

The debate on the Data Protection Bill in the House of Lords

Data Protector

Banks must still be allowed to process data to prevent fraud; regulators must still be allowed to process data to investigate malpractice and corruption; sports governing bodies must be allowed to process data to keep the cheats out; and journalists must still be able to investigate scandal and malpractice. change it substantially.

GDPR 120
article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

Take the example of the pandemic: only some governments engaged pandemic experts to develop actions plans. The intent of this analysis is to link the scope and the CSFs with the use cases into a succinct narrative describing the new DT capabilities to deliver products and services. Figure 2: Approaches to assessing use cases.