Remove Course Remove Government Remove Industry Remove Mining
article thumbnail

Mine, Mine, All Mine

John Battelle's Searchblog

Author’s musical preferences not included… No Longer Mine When I write, I like to listen to music. I’m currently researching a book covering the history of the Internet, and it’d be incredibly useful to have access to the emails and files I interacted with while we were building Wired, The Industry Standard , or Federated Media.

Mining 52
article thumbnail

Our Data Governance Is Broken. Let’s Reinvent It.

John Battelle's Searchblog

I have spent 30-plus years in the tech and media industries, mainly as a journalist, observer, and founder of companies that either make or support journalism and storytelling. The Industry Standard focused on the business of the Internet, as did my conference Web 2. And second… Governance. But Governance?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Canada Charges Its “Most Prolific Cybercriminal”

Krebs on Security

A 31-year-old Canadian man has been arrested and charged with fraud in connection with numerous ransomware attacks against businesses, government agencies and private citizens throughout Canada and the United States. Upon release from prison, Skorjanc became chief technology officer for NiceHash , a cryptocurrency mining service.

IT 275
article thumbnail

Oh, the things they say… Why we should stand up to arguments against copyright reforms

CILIP

However, there is also an industry that has been built on maximising revenues from holding copyright, often opposing such steps. As Corporate Europe Observatory ([link] has noted: “In the years before the Treaty was negotiated and finalised, the publishing and entertainment industries around the world were vociferous in lobbying against it”.

article thumbnail

Malvertising Campaign Targets IoT Devices: GeoEdge

eSecurity Planet

The IT industry and online advertising world can expect similar attacks to follow a similar pattern, Siev said, adding that it represents the “evolution of malvertising.” IoT device security has also attracted the attention of federal government officials (see The IoT Cybersecurity Act of 2020: Implications for Devices ).

IoT 145
article thumbnail

On Tech Leadership

John Battelle's Searchblog

See below… If your business focus is in technology or the Internet, as mine has been for nearly three decades, it’s quite possible you’ve never heard of the GLOBE Series , a global conference dedicated to sustainability in business. The post On Tech Leadership appeared first on John Battelle's Search Blog.

Mining 70
article thumbnail

China Issues Draft of Data Security Administrative Measures

Hunton Privacy

The Measures also cover “important data,” defined as “the data that might directly affect national security, economic security, social stability and public health and security in case of disclosure, such as non-public government information, population data covering a large area, gene health data, geographic data and mining data.”