article thumbnail

CIPL Publishes New White Paper on the Approach of British Columbia, Canada to Cross-Border Data Transfers by Public Sector Bodies

Hunton Privacy

On June 10, 2022, the Centre for Information Policy Leadership at Hunton Andrews Kurth published a white paper entitled “ Local Law Assessments and Online Services – Refining the Approach to Beneficial and Privacy-Protective Cross-Border Data Flows A: Case Study from British Columbia.”

Paper 101
article thumbnail

UK government’s response to AI White Paper consultation: next steps for implementing the principles

Data Protection Report

The authors acknowledge the assistance of Salma Khatab, paralegal, in researching and preparing some aspects of this blog The UK Department for Science, Innovation, and Technology (DSIT) has published its response to its consultation on its white paper, ‘A pro innovation approach to AI regulation ’ (the Response). Contestability and redress.

Paper 62
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security experts targeted with malicious CVE PoC exploits on GitHub

Security Affairs

” reads the research paper published by the experts. of the studied repositories have symptoms of malicious intent). ” continues the paper. During their research the experts found multiple examples of malicious PoC developed for CVEs and shared some case studies. ” continues the paper.

article thumbnail

Can AI read for you & should it?

CILIP

Can Generative AI suggest papers? Can you suggest some pivotal papers I should read on research data management?” Suggesting papers is an area where many library users assume generative AI can help, but in reality, its great at making up these sorts of answers. Can Generative AI read papers for me? I asked ChatGPT 3.5 “Can

IT 95
article thumbnail

The Limits of Cyber Operations in Wartime

Schneier on Security

Interesting paper by Lennart Maschmeyer: “ The Subversive Trilemma: Why Cyber Operations Fall Short of Expectations “: Abstract: Although cyber conflict has existed for thirty years, the strategic utility of cyber operations remains unclear. A case study of the Russo-Ukrainian conflict provides empirical support for the argument.

Paper 106
article thumbnail

Using Disinformation to Cause a Blackout

Schneier on Security

Interesting paper: " How weaponizing disinformation can bring down a city's power grid ": Abstract : Social media has made it possible to manipulate the masses via disinformation and fake news at an unprecedented scale.

Paper 142
article thumbnail

Boffins devise a new side-channel attack affecting all AMD CPUs

Security Affairs

A group of researchers from the Graz University of Technology and CISPA Helmholtz Center for Information Security devised a new side-channel attack that affects AMD CPUs. Experts demonstrated their attack technique with multiple case studies in real-world scenarios. . SecurityAffairs – hacking, cyber security).