Remove 11
article thumbnail

Documentation Theory for Information Governance

ARMA International

iv] Further, “the practices of government [and other public and private institutions] become formal or official to the extent that they are documented.” [v] This article aims to consider what a documentary focus can offer to the practices and understandings of information governance. A Documentary Approach.

article thumbnail

Former NSA TAO hacker sentenced to 66 months in prison over Kaspersky Leak

Security Affairs

Former NSA TAO hacker was sentenced to 66 months in prison because he leaked top-secret online documents related to the US government ban on Kaspersky. According to the prosecutors, between 2010 and 2015, the former NSA hacker had taken home with him TAO materials, including exploits and hacking tools.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Weekly podcast: Twitter, Spectre-NG, NIS Directive and patches

IT Governance

Hello and welcome to the IT Governance podcast for Friday, 11 May 2018. According to Schmidt, the number of systems that need these patches is enormous: all Core i processors and their Xeon derivatives released since 2010, and Atom-based Pentium, Celeron and Atom processors released since 2013 are affected.

article thumbnail

The Burden of Privacy In Discovery

Data Matters

11 As the Advisory Committee’s Note to the 1983 Amendment explained, the amended Rule sought to “prevent use of discovery to wage a war of attrition or as a device to coerce a party, whether financially weak or affluent.”12 11 See, e.g. , Am. 12-2515, 2013 WL 3974535, at *2 (E.D. Bar Ass’n Section of Litig., Haydel Enters.,

Privacy 97
article thumbnail

The debate on the Data Protection Bill in the House of Lords

Data Protector

Banks must still be allowed to process data to prevent fraud; regulators must still be allowed to process data to investigate malpractice and corruption; sports governing bodies must be allowed to process data to keep the cheats out; and journalists must still be able to investigate scandal and malpractice. change it substantially.

GDPR 120
article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

Company Sector Year Status Beyond Identity Identity management 2020 Private Expel Managed security service 2016 Private Tigera Zero trust for K8s 2016 Private Intrinsic Application security 2016 Acquired: VMware HackerOne Penetration testing 2015 Private Virtru Data encryption 2014 Private Cloudflare Cloud infrastructure 2010 NYSE: NET.

article thumbnail

Predictions 2021: How’d I Do? Pretty Damn Well.

John Battelle's Searchblog

I am a cautious proponent of crypto’s technology, philosophy, and new governance models, but there’s a hell of a lot of b t in there as well. Moving on to my last, and possibly most depressing prediction: Prediction #11: Everyone loses their s**t, in a good way. Predictions 2013. 2013: How I Did.