Remove category security-breach
article thumbnail

The Burden of Privacy In Discovery

Data Matters

The 2015 amendments to Rule 26(b)(1), however, were meant to resolve any doubt, returning the proportionality factors to their original place as part of the very definition of what is discoverable. 19 No longer are the proportionality considerations described as separate “limitations” on an inquiry governed solely by relevance.20

Privacy 97
article thumbnail

Cyber Blackmail: More Than Just Ransomware

The Texas Record

We are happy to welcome guest writers from the Texas Department of Information Resources, Daniel Hankins, Shared Services Security Manager and Andy Bennett, Director Information Security Governance. The first category is a new twist on an old criminals’ favorite: blackmail-based extortion. 1] Diamant, A. 2018, April 11).

article thumbnail

Capture the Flag events and eSports

Adam Shostack

Capture the Flag Events (CTFs) and electronic Sports (eSports) are good examples of a relatively new trend. It’s generally a tournament that spawns over hours if not a few days, where teams don’t fight each other, but rather solve problems with security related techniques. The kind of stuff hackers fantasize about.