Remove category online-privacy
article thumbnail

The Hacker Mind Podcast: Learn Competitive Hacking with picoCTF

ForAllSecure

PPP wanted to give their past high school selves the infosec education they didn’t have. Megan Kerns of Carnegie-Mellon University joins The Hacker Mind to talk about the early days and the continued evolution of this popular online infosec competition site. It's an online resource built by hackers for hackers.

article thumbnail

Two flavors of software as a service: Intuit QuickBase and Etelos | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. Topics Security , Software-as-a-service , Intuit Inc. It is now a well established online product – a ‘database reinvented for the Web’ – hosted by Intuit and sold by subscription. Where the Web 2.0

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Free Taxonomy & Folksonomy Book | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. The value of tagging and organizing information is central to this and Daniela’s ebook is an extremely useful resource that is very valuable for educating everyone involved in a team that is organizing their data.

Paper 40
article thumbnail

2019 eDiscovery Case Law Year in Review, Part 1

eDiscovery Daily

Last year, eDiscovery Daily published 66 posts related to eDiscovery and data privacy case decisions and activities over the past year, covering 56 unique cases ! We’re up to 719 lifetime case law related posts , covering 558 unique cases since our inception back in 2010. Perhaps you missed some of these? Stay tuned!

article thumbnail

The debate on the Data Protection Bill in the House of Lords

Data Protector

The new right to be forgotten will allow children to enjoy their childhood without having every personal event, achievement, failure, antic or prank that they posted online to be digitally recorded for ever more. When we do the weekly supermarket shop online, we should be able to move our shopping list electronically.

GDPR 120
article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

This part also discusses managing CS risks such as ransomware, privacy, change management, and user adoption. Thus, common tools and techniques are risk matrices, risk registers, risk logs, risk breakdown structures, risk categories, Monte Carlo simulations, and sensitivity analyses. Jurisdiction and Privacy Data Risks.

article thumbnail

Office 2.0: Eating our own dogfood. | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. At Amazon.com, he specialized in understanding how people behave online, helping Amazon build its customer-centric, measurement-focused culture. Privacy Policy | Terms of Use Around the network All rights reserved.

Paper 40