Remove 11
Remove 2008 Remove Analysis Remove Data Remove Government Remove Security
article thumbnail

CIA Hacking unit APT-C-39 hit China since 2008

Security Affairs

Chinese security firm Qihoo 360 revealed that the US CIA has hacked Chinese organizations in various sectors for the last 11 years. Chinese security firm Qihoo 360 is accusing that the US Central Intelligence Agency (CIA) of having hacked Chinese organizations for the last 11 years.

Military 139
article thumbnail

Supreme Court Finds Lack of Standing to Challenge Foreign Intelligence Surveillance Act

Hunton Privacy

Although this 5-4 decision would not be considered a “privacy” or “data breach” case, the Court’s analysis will have a significant impact on such cases going forward, and may thwart the ability of individuals affected by data breaches to assert standing based on possible future harm.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GE's Enterprise Collaboration Backbone | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. bbbcd 07/18/2008 10:26 AM Reply to Flag Gartners and Forresters I think the Gartners and Forresters can address a product or products that can be used to achieve what GE has. Hot Topics iPhone iPad Enterprise 2.0

Paper 88
article thumbnail

The debate on the Data Protection Bill in the House of Lords

Data Protector

What follows below is an edited version of the debate in the House of Lords of the Second Reading of the Data Protection Bill, held on 10 October. Data is not just a resource for better marketing, better service and delivery. Data is used to build products themselves. It has become a cliché that data is the new oil.

GDPR 120
article thumbnail

The Burden of Privacy In Discovery

Data Matters

Most of that focus has centered on data collection, storage, sharing, and, in particular, third-party transactions in which customer information is harnessed for advertising purposes. Could a party, for instance, decline to produce, review, or even collect certain types of data due to privacy concerns? But what about other contexts?

Privacy 97
article thumbnail

Searching for definition | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. Searching for definition By Oliver Marks | June 15, 2008, 10:51pm PDT Summary A recurring theme for me at the Enterprise 2.0 Hot Topics iPhone iPad Enterprise 2.0 Microsoft Office Green tech Smart phones Collaboration 2.0

Paper 40
article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

Some technology trends such as real-time data analytics are ongoing, while others are more recent, such as blockchain. Take the example of the pandemic: only some governments engaged pandemic experts to develop actions plans. When assessing the risks, consider them as inter-related, not discrete. DT Capabilities.