Remove 2017 Remove Blog Remove Financial Services Remove Manufacturing
article thumbnail

GUEST ESSAY: 5 security steps all companies should adopt from the Intelligence Community

The Last Watchdog

In the same vein, businesses at large can use the intelligence cycle as a model to detect and deter any attacks coming from foreign intelligence services. Per a 2017 CNN source , nearly 100,000 agents from as many as 80 nations operate within the United States with the intention of targeting businesses to gain access to key U.S.

Security 149
article thumbnail

Understanding Blockchain and its Impact on Legal Technology, Part Two

eDiscovery Daily

Now, Tom has written another terrific overview regarding blockchain and legal technology titled Understanding Blockchain and its Impact on Legal Technology that we’re happy to share on the eDiscovery Daily blog. Tom’s overview is split into six parts, so we’ll cover each part separately. Part one was Monday, here’s the second part.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Nation-State-Sponsored Attacks: Not Your Grandfather’s Cyber Attacks

Data Matters

Moreover, following a 78% increase in attacks on supply chain vendors between 2017 and 2020, 35% of all nation-state attacks are now targeted at enterprises. For example, the Lazarus Group (also known as APT38), which has connections to the North Korean government, is reportedly behind “the creation of the malware used in the 2017 WannaCry 2.0

article thumbnail

Regulatory Update: NAIC Summer 2018 National Meeting

Data Matters

and the EU in September 2017. Personal lines insurance” is defined to include homeowners, tenants, private passenger non-fleet automobile, mobile manufactured home and other property and casualty insurance for personal, family or household needs. The Covered Agreement prohibits a U.S. territory (i.e.,