Remove 10
Remove 2014 Remove Computer and Electronics Remove Insurance Remove Privacy Remove Security
article thumbnail

Me on the Equifax Breach

Schneier on Security

Hearing on "Securing Consumers' Credit Data in the Age of Digital Commerce". Mister Chairman and Members of the Committee, thank you for the opportunity to testify today concerning the security of credit data. My name is Bruce Schneier, and I am a security technologist. Before the. Committee on Energy and Commerce.

article thumbnail

Happy 13th Birthday, KrebsOnSecurity!

Krebs on Security

Until recently, I was fairly active on Twitter , regularly tweeting to more than 350,000 followers about important security news and stories here. The records also reveal how Conti dealt with its own internal breaches and attacks from private security firms and foreign governments.

Passwords 235
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

This means imagining the “art of the possible” for a new future using a cloud computer model to deliver transformative change. This part also discusses managing CS risks such as ransomware, privacy, change management, and user adoption. Srivastav 2014, p 18). Introduction. Risk Management and DT Experience.

article thumbnail

2019 eDiscovery Case Law Year in Review, Part 3

eDiscovery Daily

Yesterday, we looked back at cases related to cooperation, form of production, privilege and confidentiality disputes, social media related disputes and a key case regarding biometric security. Today, let’s take a look back at cases related to disputes regarding proportionality vs. relevancy vs. privacy. Hospital Partners, Inc.