article thumbnail

CISA analyzed stealthy malware found on compromised Pulse Secure devices

Security Affairs

CISA released an alert today about several stealth malware samples that were found on compromised Pulse Secure devices. Cybersecurity and Infrastructure Security Agency (CISA) published a security alert related to the discovery of 13 malware samples on compromised Pulse Secure devices, many of which were undetected by antivirus products.

article thumbnail

The Burden of Privacy In Discovery

Data Matters

Historically, the scope of discovery under Rule 26 of the Federal Rules of Civil Procedure and its state law analogues was defined exclusively in terms of relevance, with privilege providing but a narrow exception. To be within the scope of discovery, an inquiry now must be both relevant and proportional.

Privacy 97
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

eDiscovery and the GDPR: Ready or Not, Here it Comes, Part Four: eDiscovery Best Practices

eDiscovery Daily

He has also been a great addition to our webinar program, participating with me on several recent webinars, including our webinar last Friday on E-Discovery Day ( Murphy’s eDiscovery Law – How to Keep What Could Go Wrong From Going Wrong ), which was great. Secure all systems against data theft. Obtain ISO 27001 Certification.

GDPR 34
article thumbnail

Red Teaming Your Information Governance Program

Brandeis Records Manager

RT philosophy is familiar to the cyber security community, which employs penetration (pen) testing and white hat, self-hacking activities. However, RT has applications across the IG spectrum, beyond info security. Devil’s advocates have long been paired with RT exercises. We have cyber security in place. We’re good.

article thumbnail

Craig Ball of Craig D. Ball, PC: eDiscovery Trends 2018

eDiscovery Daily

Craig’s articles on forensic technology and electronic discovery frequently appear in the national media and he teaches E-Discovery and Digital Evidence at the University of Texas School of Law. Corporations fought the idea that e-mail was a ‘corporate record’ that could be discovered and that litigants were bound to preserve.

article thumbnail

The Hacker Mind Podcast: Hacking Industrial Control Systems

ForAllSecure

So there’s a need, a definite need, for information security professionals to have access to industrial control systems -- not virtual, but actual hands on systems -- so they can learn. In a moment I’ll introduce you to someone who is trying to do that--bring ICS equipment to security conferences. Technology Security.