Remove 08
Remove 2018 Remove Authentication Remove Government Remove IT
article thumbnail

Reflections on 5 business-changing IT-related trends in 2017

CGI

Mon, 01/08/2018 - 03:35. Both businesses and government breaches continued to make headlines in 2017. Blockchain technology has become so hot and full of hype, every industry is hopeful it can help organize, manage and share their data (transact) and authenticate users in distributed ledgers. to their customers.

article thumbnail

CCPA In-Depth Series: Draft Attorney General Regulations on Consumer Notice

Data Matters

In the summer of 2018, the California Legislature drafted and passed the California Consumer Privacy Act (CCPA) in record time. General Guidance (Sections 998.305-08). Check back daily for the next installment, or visit the CCPA Monitor for a collection of all our CCPA insights. Intro and Background.

Privacy 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

Listen to EP 08: Hacking Voting Systems. Vamosi: Bowen’s public inquiry revealed findings of multiple buffer overflows, software updates without authentication, and inadequate randomization of the ballots so that valid secrecy can be compromised -- among other vulnerabilities. Apple Podcasts. Google Podcasts. Spotify Podcasts.

article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

Listen to EP 08: Hacking Voting Systems. Vamosi: Bowen’s public inquiry revealed findings of multiple buffer overflows, software updates without authentication, and inadequate randomization of the ballots so that valid secrecy can be compromised -- among other vulnerabilities. Apple Podcasts. Google Podcasts. Spotify Podcasts.

article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

Listen to EP 08: Hacking Voting Systems. Vamosi: Bowen’s public inquiry revealed findings of multiple buffer overflows, software updates without authentication, and inadequate randomization of the ballots so that valid secrecy can be compromised -- among other vulnerabilities. Apple Podcasts. Google Podcasts. Spotify Podcasts.