Remove 10
article thumbnail

Predictions ’23: AI Gets a Business Model (or Three)

John Battelle's Searchblog

What I’ll call “Enterprise Explorer” could be a hugely successful – and profitable – upsell to its top clients, who wouldn’t mind paying, say, another $10 million or so a year to have a useful, sexy, and energizing new application at their disposal. Predictions 2013. 2013: How I Did.

article thumbnail

Disclosure of Cybersecurity Risks in SEC Filings on the Rise

Hunton Privacy

For example: In its 10-K filed on March 1, 2013, Citigroup Inc. disclosed in its 10-K filed on the same day that it is “regularly the target of attempted cyber attacks.”. disclosed that it “ha[s] been, and will continue to be, subject to an increasing risk of cyber incidents.”. Similarly, Goldman Sachs Group, Inc.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Did Authorities Identify the Alleged Lockbit Boss?

Krebs on Security

NEROWOLFE A search on the ICQ number 669316 at Intel 471 shows that in April 2011, a user by the name NeroWolfe joined the Russian cybercrime forum Zloy using the email address d.horoshev@gmail.com , and from an Internet address in Voronezh, RU. 2011 said he was a system administrator and C++ coder. “P.S.

article thumbnail

FTC and DOJ Issue Antitrust Policy Statement on Cybersecurity

Hunton Privacy

On April 10, 2014, U.S. It is another example of the Obama Administration’s efforts to encourage the sharing of information about cybersecurity threats and vulnerabilities. The Policy Statement, as well as their remarks, emphasize the seriousness of the cybersecurity challenge and the need to improve cybersecurity information sharing.

article thumbnail

Predictions 2015: Uber, Google, Apple, Beacons, Health, Nest, China, Adtech…

John Battelle's Searchblog

Last year, for example, I predicted that 2014 would be the year that the Internet would “adopt the planet as its cause.” A good example of this is my declaring that Twitter would become a major media platform three years ago. Predictions 2013. 2013: How I Did. Predictions 2011. 2011: How I Did.

Marketing 111
article thumbnail

Chinese Ministry of Industry and Information Technology Enacts Draft Rules on Personal Information

Hunton Privacy

The comment period is open until May 15, 2013. For example, under the Draft Provisions, telecommunications service providers and Internet information service providers (“IISPs”) are: prohibited from collecting or using personal information without the user’s consent.

article thumbnail

Recent Developments Concerning Cybersecurity Disclosure for Public Companies

Hunton Privacy

In a speech on June 10, 2014, Commissioner Luis Aguilar made remarks on cybersecurity issues during a conference hosted by the New York Stock Exchange. We provide an overview of recent developments in public company cybersecurity disclosure of particular interest to public companies. Commissioner Aguilar Speech. 2 — Cybersecurity.