Remove Computer and Electronics Remove Conference Remove Government Remove IoT
article thumbnail

MY TAKE: ‘Digital trust’ has a huge role to play mitigating cybersecurity threats, going forward

The Last Watchdog

Related: Leveraging PKI to advance electronic signatures. It used to be that trusting the connection between a workstation and a mainframe computer was the main concern. The security experts and thought leaders at DigiCert’s conference discussed the progress being made on a couple of other fronts: protocols and policies.

article thumbnail

MY TAKE: Why security innovations paving the way for driverless cars will make IoT much safer

The Last Watchdog

Intelligent computing systems have been insinuating themselves into our homes and public gathering places for a while now. Grimm CEO Brain Demuth told me he hopes the work Grimm has commenced in Sparta will also contribute to generally elevating the security of all types of IoT systems. Get ready for smart ground transportation.

IoT 133
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Supply Chain Security 101: An Expert’s View

Krebs on Security

Earlier this month I spoke at a cybersecurity conference in Albany, N.Y. Tony Sager (TS): The federal government has been worrying about this kind of problem for decades. But even then there were people who saw where this was all going, and there were some pretty big government programs to look into it.

Security 206
article thumbnail

Ignoring Internet of Things Devices Could Be IdIoTic: eDiscovery Trends

eDiscovery Daily

See what I did there? ; o ) While I’m speaking at the University of Florida E-Discovery Conference today, let’s take a look at a couple of articles related to Internet of Things (IoT) devices that you need to know from an eDiscovery standpoint. Dana Conneally, managing partner at QDiscovery and Evidox Corp., But, that’s not all!

article thumbnail

Understanding eDiscovery in Criminal Cases, Part Three: eDiscovery Best Practices

eDiscovery Daily

The government will usually get its ESI by consent or warrant. Typically, when the federal government seeks data in criminal cases (and most states have a similar procedure), it requests a search and seizure warrant by filing an application or affidavit sworn before a judge. Issues Managing ESI Data in Criminal Cases. Additionally, F.

article thumbnail

Relativity Fest is Here! And So Are We!: eDiscovery Trends

eDiscovery Daily

The 2018 Relativity Fest conference is here! If you’re in the Chicago area, you can still make it for nearly all of the conference or attend on a one-day pass. Also, I will be covering the show for eDiscovery Daily , and I’m delighted to say that I will also once again be speaking at a session at the conference tomorrow.

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

This means imaging the “art of the possible” for a new future using a cloud computing model to deliver transformative change. Gartner (2021) has two related definitions: Digital Transformation: “can refer to anything from IT modernization (for example, cloud computing), to digital optimization, to the invention of new digital business models.”