Sat.Aug 29, 2015 - Fri.Sep 04, 2015

article thumbnail

This Is How We Pick A NewCo

John Battelle's Searchblog

The post This Is How We Pick A NewCo appeared first on John Battelle's Search Blog. Over on the NewCo site , I’ve updated our explanation of how we chose NewCos around the world (1,100 or so so far). Here’s that post for those readers at Searchblog who might be interested. . Since we launched NewCo’s festivals in late 2012, tens of thousands of people have experienced the unique NewCo model of “getting out to get in.

article thumbnail

How phishing works

Elie

Phishing is a social-engineering attack where the attacker entice his victims to give-up their credentials for a given website by impersonating it. Believe it or not phishing campaigns are well organized and follow a very strict playbook. This post aim at shedding some light on how phishing campaign works under the hood, showcase which infrastructure phishers use to steal users credentials and provide advice on how to defend against it.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CNIL Publishes Internet Sweep Results and New Guidelines for Websites Aimed at Children

Hunton Privacy

On September 2, 2015, the French Data Protection Authority (“CNIL”) published the results of an Internet sweep of 54 websites visited by children and teenagers. The sweep was conducted in May 2015 to assess whether websites that are directed toward, frequently used by or popular among children comply with French data protection law. As we previously reported , the sweep was coordinated by the Global Privacy Enforcement Network (“GPEN”), a global network of approximately 50 data protection author

article thumbnail

Information Sharing is the Grease in Workplace Collaboration

Attensa

We’ve written a new Point of View on how the smart delivery of highly relevant information can stimulate new ideas, accelerate projects and move them into new productive directions. You can download it here. Workplace collaboration continues to be an important theme these days but there’s a significant omission in how many observers approach and discuss the topic – the role of relevant information as the spark that lights the fire of meaningful collaboration.

IT 40
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Russia’s new data law

Privacy and Cybersecurity Law

Russia’s new Data Localisation Law went live yesterday on 1 September. Many companies with operations in Russia are scratching their […].

Privacy 40

More Trending

article thumbnail

Department of Defense Issues New Cyber Incident Reporting and Cloud Computing Requirements for Contractors

Hunton Privacy

On August 26, 2015, the U.S. Department of Defense (“DoD”) published an interim rule entitled Defense Federal Acquisition Regulation Supplement: Network Penetration Reporting and Contracting for Cloud Services (DFARS Case 2013–D018) (the “Interim Rule”), that streamlines the obligations for contractors to report network penetrations and establishes DoD requirements for contracting with cloud computing service providers.

Cloud 40
article thumbnail

German Data Protection Commissioners Issue Position Paper on Proposed EU General Data Protection Regulation

Hunton Privacy

On August 14 and August 26, 2015, the Conference of the Data Protection Commissioners of the Federal Government and the Federal States ( Länder ) issued a detailed position paper (“Position Paper”) and a press release on the main issues for the trilogue negotiations on the proposed EU General Data Protection Regulation (the “Regulation”). In the Position Paper and press release, the participating German Data Protection Commissioners (“German DPAs”) request the trilogue partners to focus on the f

Paper 61