Remove 2011 Remove Events Remove Security Remove Video
article thumbnail

French Data Protection Authority Unveils 2010 Annual Activity Report

Hunton Privacy

On November 16, 2011, the French Data Protection Authority (the “CNIL”) published its Annual Activity Report for 2010 (the “Report”) highlighting its main 2010 accomplishments and outlining some of its priorities for the upcoming year. Read the CNIL’s full report (in French). Read our coverage of the CNIL’s 2009 Activity Report.

Privacy 40
article thumbnail

Capture the Flag events and eSports

Adam Shostack

Capture the Flag Events (CTFs) and electronic Sports (eSports) are good examples of a relatively new trend. Now take that, and imagine that for some people, the game is a video game and the lawn is a network. If your mind is not blown already, here’s a crowd of about six hundred people cheering for a video game to start.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Resolving Disputes During & Post COVID

Information Governance Perspectives

It’s an honor to be with you all and kick off today’s event with a timely discussion about the collaborative technology that is really dominating the way we all have begun to work and collaborate. So security is up to you, plain and simple. Thank you for that introduction Mark.

article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

“Commissioned by organizers to predict worst-case scenarios for the Munich games, [Georg] Sieber came up with a range of possibilities, from explosions to plane crashes, for which security teams should be prepared. Latson 2014) Unfortunately, the events unfolded almost exactly like the scenario in Situation Number 21. 2020, p 1). “As

article thumbnail

Top Database Security Solutions for 2021

eSecurity Planet

Naturally, database vendors are leading providers of database security tools, and a growing number of cloud-based database providers are moving deeper into the data security space. Security is paramount. Starting our list of the top database security vendors is the multinational cloud computing company, Alibaba Cloud.

Security 117
article thumbnail

The Hacker Mind Podcast: Hacking the Art of Invisibility

ForAllSecure

SO I only mention Ross Ulbricht in talks because I use him as an example of an Operation Security, or OpSec failure. Operational Security is typically a military process. In 2011, there a was user in a chat room by the name of altoid, like the mint. Anyone talking about it in 2011 most likely had inside information.

Privacy 52
article thumbnail

Is Amazon’s Textract a Game Changer?

Info Source

Here’s what Amazon has to say about it, “Amazon Textract is based on the same proven, highly scalable, deep learning technology developed by Amazon’s computer vision scientists to analyze billions of images and videos daily…. In fact, later this month, at the IAOP OWS19 event in Orlando (Feb. The pressure is on.

ECM 40