article thumbnail

Sophie Sayer on the IT Governance Partner Programme

IT Governance

The benefits of partnering with us, and our partner-exclusive event IT Governance launched its partner programme in 2017, which now includes more than 400 organisations. What else can partners expect from the event? Once a year, we also like to get all our partners in one room at our annual partner event.

article thumbnail

‘Spam Nation’ Villain Vrublevsky Charged With Fraud

Krebs on Security

When I first began writing about Vrublevsky in 2009 as a reporter for The Washington Post , ChronoPay and its sister firm Red & Partners (RNP) were earning millions setting up payment infrastructure for fake antivirus peddlers and spammers pimping male enhancement drugs.

Risk 185
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

North Korea-linked Zinc group posed as Samsung recruiters to target security firms

Security Affairs

This threat actor has been active since at least 2009, possibly as early as 2007, and it was involved in both cyber espionage campaigns and sabotage activities aimed to destroy data and disrupt systems. io ), to share videos of their claimed exploits, and for amplifying and retweeting posts from other accounts under their control.

Security 124
article thumbnail

Portrait of Twitter As A Young Media Company

John Battelle's Searchblog

Regardless, Twitter has become a go-to service for quick updates about news events ( Sandy , Newtown , etc), entertainment events ( SuperBowl , Oscars , Grammys , etc), and well… pretty much any kind of event. For a big event like Sandy Hook or the Oscars, there are literally millions of tweets to sift through.

IT 111
article thumbnail

Microsoft: North Korea-linked Zinc APT targets security experts

Security Affairs

This threat actor has been active since at least 2009, possibly as early as 2007, and it was involved in both cyber espionage campaigns and sabotage activities aimed to destroy data and disrupt systems. io ), to share videos of their claimed exploits, and for amplifying and retweeting posts from other accounts under their control.

Security 113
article thumbnail

The Digital Markets Act Is Almost Here: 10 Things to Know About the EU’s New Rules for Big Tech

Data Matters

Companies would be obliged to notify the Commission without delay (and in any event within two months) of meeting the quantitative thresholds. billion or a market capitalization of at least €75 billion and 45 million monthly active end users and 10,000 yearly active business users in the EU). Designation Process.

article thumbnail

French Data Protection Authority Unveils 2010 Annual Activity Report

Hunton Privacy

This year’s Report covers events that occurred since last year’s publication of the Annual Activity Report for 2009. The CNIL inspected the implementation of 55 video surveillance cameras ( i.e. , CCTV cameras) and included in its Report recommendations for the implementation of such devices in workplaces.

Privacy 40