Remove category general
article thumbnail

The Myth of Consumer-Grade Security

Schneier on Security

Yet that's not possible, because there is no longer any difference between those categories of devices. In his keynote address at the International Conference on Cybersecurity, Attorney General William Barr argued that companies should weaken encryption systems to gain access to consumer devices for criminal investigations.

Military 104
article thumbnail

GUEST ESSAY: The story behind how DataTribe is helping to seed ‘Cybersecurity Valley’ in Maryland

The Last Watchdog

Within these government labs and agencies, taking place is a groundswell of innovation in deep technology cyber disciplines to the tune of billions of dollars annually over the past three decades. Kleiner was the founder of Fairchild Semiconductor and Perkins was an early Hewlett-Packard computer division manager.)

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Supply Chain Security 101: An Expert’s View

Krebs on Security

Earlier this month I spoke at a cybersecurity conference in Albany, N.Y. Tony Sager (TS): The federal government has been worrying about this kind of problem for decades. But even then there were people who saw where this was all going, and there were some pretty big government programs to look into it.

Security 210
article thumbnail

Relativity Fest is Here! And So Are We!: eDiscovery Trends

eDiscovery Daily

The 2018 Relativity Fest conference is here! If you’re in the Chicago area, you can still make it for nearly all of the conference or attend on a one-day pass. Also, I will be covering the show for eDiscovery Daily , and I’m delighted to say that I will also once again be speaking at a session at the conference tomorrow.

article thumbnail

The Burden of Privacy In Discovery

Data Matters

To pick just two recent examples of the latter, the EU’s General Data Protection Regulation1 (GDPR) and the California Consumer Privacy Act2 (CCPA) both impose sweeping requirements on businesses with the aim of increasing consumers’ privacy and control over how their personal data is used. any designated tangible things.”36

Privacy 97
article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

This means imagining the “art of the possible” for a new future using a cloud computer model to deliver transformative change. Thus, common tools and techniques are risk matrices, risk registers, risk logs, risk breakdown structures, risk categories, Monte Carlo simulations, and sensitivity analyses. Cloud-first “Mind-shift”.

article thumbnail

The debate on the Data Protection Bill in the House of Lords

Data Protector

In our manifesto at the general election we committed to provide people with the ability to require major social media platforms to delete information held about them, especially when that information related to their childhood. When we do the weekly supermarket shop online, we should be able to move our shopping list electronically.

GDPR 120