Remove 10
Remove 2011 Remove Data Remove Document Remove Education
article thumbnail

NASA hacked! An unauthorized Raspberry Pi connected to its network was the entry point

Security Affairs

NASA Office of Inspector General revealed that the Agency’s network was hacked in April 2018, intruders exfiltrated roughly 500 MB of data related to Mars missions. The report says that hackers stole roughly 500 MB of data related to Mars missions from NASA’s Jet Propulsion Laboratory in Southern California. In December the U.S.

IT 111
article thumbnail

A Stitch in Time: Preserving Websites Related to Sustainability in the Fashion Industry

Archive-It

In order to document where the textile industry in the United States is now, we had to start with the websites of the textile and garment companies, both large and small, that still operate here. In 2017, eight tractor-trailers carrying over 5000 cubic feet of archival materials and tens of thousands of books arrived at Cornell.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The debate on the Data Protection Bill in the House of Lords

Data Protector

What follows below is an edited version of the debate in the House of Lords of the Second Reading of the Data Protection Bill, held on 10 October. Data is not just a resource for better marketing, better service and delivery. Data is used to build products themselves. It has become a cliché that data is the new oil.

GDPR 120
article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

Some technology trends such as real-time data analytics are ongoing, while others are more recent, such as blockchain. A cloud-first “mind-shift” implies using a cloud computing model, which exposes an organization to risks on the Internet, where data is considered “digital gold” that cyber criminals want to steal.

article thumbnail

2019 eDiscovery Case Law Year in Review, Part 3

eDiscovery Daily

US forecloses the government’s ability to obtain this type of data without a warrant. 2011: Part 1 , Part 2 , Part 3 , Part 4. Court Denies Plaintiff’s Motion to Compel Production of ESI Related to 34 Searches : In Lareau v. Vermont District Judge William K. California District Judge Edward J. 2017: Part 1 , Part 2 , Part 3 , Part 4.

article thumbnail

An Approach to Cybersecurity Risk Oversight for Corporate Directors

Data Matters

A high-profile cyber incident may cause substantial financial and reputational losses to an organization, including the disruption of corporate business processes, destruction or theft of critical data assets, loss of goodwill, and shareholder and consumer litigation. Encrypting critical data assets. Using appropriate access controls.