article thumbnail

LookingGlass Cyber Solutions: Threat Intelligence Review

eSecurity Planet

This article provides more in-depth information on the product and its features. Markets and Use Cases LookingGlass is suitable for all verticals, with particular uptake when utilizing it in a third-party risk monitoring capacity. For a comparison with other TIP products, see our complete list of top threat intelligence companies.

article thumbnail

Do You Have the Right Stuff to Transition to Information Governance?

ARMA International

Follow this trajectory and you’ll push the envelope toward information governance (IG) and position yourself as a Very Important Person in your enterprise. all of which require the same disciplines we utilize when managing our records. The task before us now is to apply these to all of the rest of our information. A Real-World Example.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Leak of Grid Vulnerabilities Creates National Security Risks

Hunton Privacy

The recent leak of an internal memo to the former Chair of the Federal Energy Regulatory Commission, which was widely reported by national news media, has created a national security setback for the United States. In an article published in Intelligent Utility Update , Hunton & Williams partner Paul M.

article thumbnail

Hidden Biases in Cybersecurity Reviews – And How to Use Them

eSecurity Planet

The survey should have representation from categories such as: Company size: small to large Industry vertical: healthcare, energy, etc. Organization type: corporate, education, utility, non-profit, government International regions: Asia, South America, North America, etc. Were the installers or users even technically competent?

article thumbnail

Connected products at the edge

IBM Big Data Hub

Those same requirements of data compliance, data privacy, data sovereignty, data governance and data residency are just as relevant with connected products. and energy and utilities. Thanks to Joe Pearson and Charla Stracener for reviewing the article and providing their thoughts. Let us know what you think.

article thumbnail

NIST Updates Cybersecurity Framework

Data Matters

* This article first appeared on Law360 on April 17, 2018. As with the first version of NIST’s Cybersecurity Framework, all companies should review the new version, determine its potential utility, and consider adopting, adapting or comparing the new Framework for use within their own cyber ecosystems. Significantly, version 1.1

article thumbnail

A Soccer Field on the Data Center, Chickens in the Parking Lot - in Northern Virginia

Interactive Information Management

A user/purchaser of local resources, from facility supplies, energy and materials to IT equipment and services 4. A participant in local government planning and operations – from energy and land use policy to economic development and homeland security 6. How can these physical IT clusters compound potential economic growth?